M2M Security – War Texting Attacks

March 1, 2016

Wireless machine-to-machine (M2M) applications are usually comprised of three distinct parts: the vertical specific M2M devices, the wireless and wired communication networks and the central M2M backend server. M2M devices typically include a microcontroller to run the customer-specific M2M application, peripheral devices or sensors that are connected to the controller, and a cellular communication module in combination with a machine identity module (MIM), which establishes remote communication with the M2M server via wireless networks. All elements of an M2M solution can be the target of attacks. Only an integrated security approach, beginning with the system design phase and considering the entire end-to-end security chain, can effectively prevent M2M attacks and reduce risk to the M2M solution.

Spotlight

Achronix Semiconductor Corporation

Achronix is a privately held fabless corporation based in Santa Clara, California. Achronix is the only company to offer high-density and high-performance application...

OTHER WHITEPAPERS
news image

Best Practice For End-To-End IoT Security

whitePaper | January 31, 2022

Security concerns remain a major barrier to IoT adoption for as many as 85% of IoT industry leaders1. Fraud is growing in this area, causing widespread agreement across the ecosystem that securing the IoT application is the only way to fully develop its business potential. The good news is the vast majority of attacks can be prevented – and the resilience of any IoT deployment significantly improved – with measures that are simple and cost-effective to implement.

Read More
news image

Powering the Internet of Things with End-to-End Battery Testing

whitePaper | January 24, 2023

Technology is advancing rapidly, transforming many aspects of society, including how we communicate, navigate, and treat diseases. The Internet of Things (IoT) is growing rapidly as there are more electronics than ever to run accurate diagnostics, more sensors to increase autonomy, and better connectivity to avoid interference. Plus, the miniaturization of semiconductor components and advancement in electronic display technologies enables consumer electronic (CE) devices to become compact.

Read More
news image

How Virtual Desktop Infrastructure (VDI) Can Help Your Business Survive the Pandemic—And Prevail in the Future

whitePaper | August 23, 2022

Growing demand for remote working solutions in light of the pandemic is bolstering the case for virtual desktop infrastructure (VDI) adoption. In this white paper, we discuss why VDI is best suited for today’s business environments, especially since remote work is poised to play a big role both now and in the “new normal” of a post-COVID-19 world. We discuss VDI’s main advantages, its shortcomings and what can be done to address them.

Read More
news image

WI-FI 6E AND FUTURE-PROOFING WIRELESS INFRASTRUCTURE

whitePaper | May 23, 2023

The future of wireless networking needs will continue to grow. Location based services, sensors, and IoT devices will continue to be added to wireless networks. Expanding and new uses of Wi-Fi that require high performing connections like AR/VR, AI/ML, and new technologies we don’t even know about yet will compete for wireless network resources. Finally, all the standard uses we currently associate with Wi-Fi like video and voice calls, streaming services and cloud hosted applications will continue to bring more devices to wireless networks with increasing traffic demands.

Read More
news image

IoT Signals- Edition 3 (Microsoft)

whitePaper | October 5, 2021

The Internet of Things (IoT) is rapidly changing the world around us, transforming a huge range of physical objects through digital intelligence. Beyond our ubiquitous smart personal devices, IoT is revolutionizing the way companies do business – helping them become faster, smarter, safer, and more efficient.

Read More
news image

Improving the Reliability of the Internet of Things

whitePaper | May 24, 2022

Despite the best efforts of developers, embedded and IoT systems are usually deployed with bugs remaining in their code. A development team introduces an average of 120 bugs per 1,000 lines of code during development. Approximately 5 percent, or 6 bugs per 1,000 lines of code, typically remain in the shipped software.

Read More

Spotlight

Achronix Semiconductor Corporation

Achronix is a privately held fabless corporation based in Santa Clara, California. Achronix is the only company to offer high-density and high-performance application...

Events