Tackling the IoT security challenge via the component chain

08 January 2016
Report type: Research Note
Author(s): Godfrey Chua
Keywords: M2M, machine-to-machine, IoT, Internet of Things, security, white hat hackers
Companies: Shodan, Philips
Number of Pages: 6

The inherent complexity of an IoT solution, which is comprised of multiple and often disparate components, represents one of the more fundamental challenges to a development program. Effective integration of each component into an overall solution requires broad technical knowhow and exemplary process management skills. These elements are critical to any successful solution. When it comes to security, the same factors should apply.

This Research Note examines the security challenges in the IoT component chain. It reviews the case of connected baby monitors and builds broader industry implications from vulnerabilities recently discovered in these consumer IoT devices.

Keywords: M2M, machine-to-machine, IoT, Internet of Things, security, white hat hackers

Companies covered in this report: Shodan, Philips

6 pages

 

Download PDF > Log in or subscribe to this Research Stream, please see our Advisory Service.
quick links >