Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Does IoT Make Products Smart But Hackable?

DZone's Guide to

Does IoT Make Products Smart But Hackable?

A preview of the keynote at the CeBit conference on March 17th, looking at the security concerns around IoT ecosystems.

· IoT Zone
Free Resource

Address your IoT software testing needs – improve quality, security, safety, and compliance across the development lifecycle.

Data is the new oil. Companies grow and profits are made through data access of product usage, consumer data, production statistics etc. The Internet of Things opens the door for companies to mine data on a whole new level, but do we really consider the IoT security risks?

IoT SecurityThis week Cesanta CEO Anatoly Lebedev is delivering a keynote at the international tech event CeBit. He will tackle the question of whether IoT makes products smart but hackable head on.

Will Your Brand Survive?

“Security is often compromised in favour of bringing a connected product to market fast,” this statement by Anatoly hits the problem on the head. Companies want to stay ahead of the competition and release their smart products. However, security is often misunderstood and compromised. An example of this is the Fisher Price Smart Bear. Here a security breach that could have led to a child’s data being hacked was discovered by an independent organisation Rapid7. Thankfully no-one was harmed as the issue was discovered fast enough to avoid a hack. Could your brand survive a headline like this?

IoT Security - where it all goes wrong

Hasty development and oftentimes in-house development are the causes for IoT security fails. Embedded development is complex and require extensive experience. We’ve seen this lead to mistakes frequently, simply because for the sake of deployment speed, security risks are more easily taken.

“With the right partner, there is no need for this compromise. In fact, it should speed up the development process and increase security. There is no need to put your brand or your consumers at risk,” Anatoly explains ahead of his keynote on Thursday.

Getting Security Right — the IoT Security Checklist

It’s vital to follow these four steps when developing a secure smart product:

  • Use secure hardware
  • RNG (random number generation) or the whole crypto stack on chip
  • Anti-tamper features
  • Implement secure communication (encryption and authentication)
  • TLS/DTLS standards
  • Have a recovery plan (should things go wrong)
  • Build OTA functionality (over-the-air updates and remote management) into your devices
  • An established IoT solution provider brings the security expertise as well as ongoing support through development updates and OTA functionality to smart product development. The bottom line is clear, connected devices will get to market faster, at a lower production cost and with ongoing maintenance.

    Follow the Keynote

    If you want to find out more, you can watch Anatoly on the Expert Stage at CeBit on Thursday, March 17th at 12.15pm (CET) right here.

    Accelerate the delivery of high-quality software in the connected IoT era through an integrated analysis, testing, security, and analytics platform

    Topics:
    security ,iot ,protocols ,messaging

    Published at DZone with permission of Anatoly Lebedev, DZone MVB. See the original article here.

    Opinions expressed by DZone contributors are their own.

    THE DZONE NEWSLETTER

    Dev Resources & Solutions Straight to Your Inbox

    Thanks for subscribing!

    Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.

    X

    {{ parent.title || parent.header.title}}

    {{ parent.tldr }}

    {{ parent.urlSource.name }}