Does IoT Make Products Smart But Hackable?

DZone 's Guide to

Does IoT Make Products Smart But Hackable?

A preview of the keynote at the CeBit conference on March 17th, looking at the security concerns around IoT ecosystems.

· IoT Zone ·
Free Resource

Data is the new oil. Companies grow and profits are made through data access of product usage, consumer data, production statistics etc. The Internet of Things opens the door for companies to mine data on a whole new level, but do we really consider the IoT security risks?

IoT SecurityThis week Cesanta CEO Anatoly Lebedev is delivering a keynote at the international tech event CeBit. He will tackle the question of whether IoT makes products smart but hackable head on.

Will Your Brand Survive?

“Security is often compromised in favour of bringing a connected product to market fast,” this statement by Anatoly hits the problem on the head. Companies want to stay ahead of the competition and release their smart products. However, security is often misunderstood and compromised. An example of this is the Fisher Price Smart Bear. Here a security breach that could have led to a child’s data being hacked was discovered by an independent organisation Rapid7. Thankfully no-one was harmed as the issue was discovered fast enough to avoid a hack. Could your brand survive a headline like this?

IoT Security - where it all goes wrong

Hasty development and oftentimes in-house development are the causes for IoT security fails. Embedded development is complex and require extensive experience. We’ve seen this lead to mistakes frequently, simply because for the sake of deployment speed, security risks are more easily taken.

“With the right partner, there is no need for this compromise. In fact, it should speed up the development process and increase security. There is no need to put your brand or your consumers at risk,” Anatoly explains ahead of his keynote on Thursday.

Getting Security Right — the IoT Security Checklist

It’s vital to follow these four steps when developing a secure smart product:

  • Use secure hardware
  • RNG (random number generation) or the whole crypto stack on chip
  • Anti-tamper features
  • Implement secure communication (encryption and authentication)
  • TLS/DTLS standards
  • Have a recovery plan (should things go wrong)
  • Build OTA functionality (over-the-air updates and remote management) into your devices
  • An established IoT solution provider brings the security expertise as well as ongoing support through development updates and OTA functionality to smart product development. The bottom line is clear, connected devices will get to market faster, at a lower production cost and with ongoing maintenance.

    Follow the Keynote

    If you want to find out more, you can watch Anatoly on the Expert Stage at CeBit on Thursday, March 17th at 12.15pm (CET) right here.

    iot, messaging, protocols, security

    Published at DZone with permission of Anatoly Lebedev , DZone MVB. See the original article here.

    Opinions expressed by DZone contributors are their own.

    {{ parent.title || parent.header.title}}

    {{ parent.tldr }}

    {{ parent.urlSource.name }}