www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...

An end-to-end approach is needed for IoT device security

As IoT devices proliferate, the vulnerabilities scale linearly.

by Vish Pai, Ayla Networks - Embedded Computing Design, May. 22, 2015 – 

Most of the "things" connected to the Internet of Things (IoT) are produced companies not accustomed to thinking in terms of connectivity. These manufacturers are experts in water heaters or door locks or coffee makers, but they probably don't know what a really good connected water heater or door lock or coffee maker should be. And they certainly haven't had to worry about the kinds of security threats that come with IoT connectivity.

In the IoT, the same connectivity pathways that enable all the benefits - homeowners controlling or receiving alerts about their heating, lighting, and home security systems even from a distance; people tracking various biometric values to optimize their health and fitness; manufacturers gathering invaluable data on where, how, and how often their products are being used - also introduce security risks that unconnected products never faced.

Without proper security mechanisms in place, data traversing the public Internet is vulnerable to hackers. Manufacturers of connected "things" must think about the security not only of the products themselves, but also of the entire connected pathway. In other words, data must be secured from the time it leaves the end device or appliance, throughout its journey to and from the cloud, until it reaches the end user's mobile app or browser-based application - and back again, as control instructions go from the user's app back to the device, via the Internet.


Click here to read more...

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.