Mahekzade
2 min readMay 8, 2023

Secure Protocols in IOT
What are Protocols?
Protocols refer to a set of rules and guidelines that are followed in a particular system, network, or organisation to enable communication and the transfer of data between different devices or entities.
Networks have to follow these rules to successfully transmit data. ‘Protocols’ are developed by industry wide organisations. All data of protocols are stored in binary information. Protocol language is a mixture of bits, characters, integers, etc.

  • Types Of Protocols
    There are different protocols used in internet that are:
    TCP/IP (Transmission Control Protocol/Internet Protocol)
    ARP (Address Resolution Protocol)
    DHCP (Dynamic Host Configuration Protocol)
    DNS (Domain Name System)
    FTP (File Transfer Protocol)
    Use of Protocols
    Protocols are used in many different fields, including computer networking, telecommunications, and data communication, to facilitate communication and the transfer of data between different devices or systems. Some of the key uses of protocols include:
  • Enabling communication
  • Ensuring compatibility
  • Facilitating data transfer

Enhancing security
Without protocols, it would be difficult or impossible for different devices to communicate with each other, and data transfer would be unreliable and insecure.

  • Why do we need Protocols ?
    Without protocols, it would be difficult for different devices and systems to communicate with each other, leading to a fragmented and unreliable communication network. Some of the main reasons why we need protocols include:
  • Standardisation
  • Efficiency
  • Security

Interoperability
Need to Secure Protocols
It is important to secure protocols to protect against various security threats that can compromise the integrity, confidentiality, and availability of data being transmitted.
To protect against these and other security threats, protocols can be secured by implementing encryption, authentication, access control, and other security measures. For example, protocols such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use encryption to secure data being transmitted over the network, while protocols such as Internet Protocol Security (IPsec) provide secure communication between devices. Overall, securing protocols is essential for ensuring the confidentiality, integrity, and availability of data being transmitted over the network.
Ways to Secure Protocols
There are several ways to secure protocols, including:

  • Encryption
  • Authentication
  • Access Control
  • Key Management
  • Protocol hardening
  • Regular updates and patches

Publishers: Mahek Zade, Sandesh Tangade, Balganesh Thombre,Prathamesh Yeti