WELCOME TO The THE INTERNET OF THINGS REPORT
The Route to Smart Warehousing — and Why IoT Matters
ANDREI KLUBNIKIN | November 28, 2018
Cosemi is the first fabless optical semiconductor company. Our innovative technology and high volume manufacturing approach deliver breakthrough improvements...
Article | April 9, 2020
The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyone’s best interest to consider the potential impact of every point of data output in your technological ecosystem. Any of these devices could affect the security of your digital connections. To minimize both personal and enterprise risk, it’s important to adhere to the following IoT security best practices.
Operating a utility business can be particularly difficult, especially when you’re trying to maximize ROI. In the water utility space, per capita water usage has decreased while the water itself has become more expensive to collect. Across utilities sectors, aging infrastructure takes a large cost to maintain and eventually update. Consumer expectations and regulations also can cut into ROI. As they should, people expect clean and safe water and a continuous supply of electricity. The driving factor in the utilities space is efficiency. Enter the smart water meter. For our IoT water management solution, we used Google Cloud Platform (GCP). GCP has various benefits for water management through its wide array of products. We will go over two important features of a water management IoT solution.
To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.
Edge computing refers to information being processed at the edge of the network, rather than being sent to a central cloud server. The benefits of edge computing include reduced latency, reduced costs, increased security and increased business efficiency. Transferring data from the edge of a network takes time, particularly if the data is being collected in a remote location. While the transfer may usually take less than a second, glitches in the network or an unreliable connection may increase the time required. For some IoT applications, for example, self-driving cars, even a second may be too long. Imagine a security camera that’s monitoring an empty hallway. There’s no need to send hours of large video files of an empty hallway to a cloud server (where you will need to pay to store them). With edge computing, the video could be sent to the cloud only if there is movement detected in the hallway.
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE