Over a million developers have joined DZone.

Does IoT Make Products Smart But Hackable?

A preview of the keynote at the CeBit conference on March 17th, looking at the security concerns around IoT ecosystems.

· IoT Zone

Access the survey results 'State of Industrial Internet Application Development' to learn about latest challenges, trends and opportunities with Industrial IoT, brought to you in partnership with GE Digital.

Data is the new oil. Companies grow and profits are made through data access of product usage, consumer data, production statistics etc. The Internet of Things opens the door for companies to mine data on a whole new level, but do we really consider the IoT security risks?

IoT SecurityThis week Cesanta CEO Anatoly Lebedev is delivering a keynote at the international tech event CeBit. He will tackle the question of whether IoT makes products smart but hackable head on.

Will Your Brand Survive?

“Security is often compromised in favour of bringing a connected product to market fast,” this statement by Anatoly hits the problem on the head. Companies want to stay ahead of the competition and release their smart products. However, security is often misunderstood and compromised. An example of this is the Fisher Price Smart Bear. Here a security breach that could have led to a child’s data being hacked was discovered by an independent organisation Rapid7. Thankfully no-one was harmed as the issue was discovered fast enough to avoid a hack. Could your brand survive a headline like this?

IoT Security - where it all goes wrong

Hasty development and oftentimes in-house development are the causes for IoT security fails. Embedded development is complex and require extensive experience. We’ve seen this lead to mistakes frequently, simply because for the sake of deployment speed, security risks are more easily taken.

“With the right partner, there is no need for this compromise. In fact, it should speed up the development process and increase security. There is no need to put your brand or your consumers at risk,” Anatoly explains ahead of his keynote on Thursday.

Getting Security Right — the IoT Security Checklist

It’s vital to follow these four steps when developing a secure smart product:

  • Use secure hardware
  • RNG (random number generation) or the whole crypto stack on chip
  • Anti-tamper features
  • Implement secure communication (encryption and authentication)
  • TLS/DTLS standards
  • Have a recovery plan (should things go wrong)
  • Build OTA functionality (over-the-air updates and remote management) into your devices
  • An established IoT solution provider brings the security expertise as well as ongoing support through development updates and OTA functionality to smart product development. The bottom line is clear, connected devices will get to market faster, at a lower production cost and with ongoing maintenance.

    Follow the Keynote

    If you want to find out more, you can watch Anatoly on the Expert Stage at CeBit on Thursday, March 17th at 12.15pm (CET) right here.

    The IoT Zone is brought to you in partnership with GE Digital.  Discover how IoT developers are using Predix to disrupt traditional industrial development models.


    Published at DZone with permission of Anatoly Lebedev, DZone MVB. See the original article here.

    Opinions expressed by DZone contributors are their own.

    The best of DZone straight to your inbox.

    Please provide a valid email address.

    Thanks for subscribing!

    Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.

    {{ parent.title || parent.header.title}}

    {{ parent.tldr }}

    {{ parent.urlSource.name }}