Volansys VConnect Stack for Apple Homekit Based IOT Gateway

| May 13, 2015

article image
We present an extension of Apple HomeKit that can be functional in the future of smart homes. Here we will show how Volansys VConnect Stack and an iOS application perform a part in Zigbee Home Automation using Marvell's MZ100 module.

Spotlight

IoT M2M Council (Formerly International M2M Council)

The IMC is operational since early 2014 and already counts 12,000 OEMs and enterprise users that deploy IoT solutions as Adopter Members, gaining almost 300 of these individual associates weekly, making it the largest and fastest-growing professional group serving the IoT/M2M sector. The IMC brings together M2M Solutions Providers – its Sustaining Members – with Adopters of IoT/M2M technology on every continent of the globe. IMC Adopter Members come from operations, product design, sales & marketing, or IT, and across vertical markets like energy, healthcare, automotive, logistics, building & construction, manufacturing, and more.

OTHER ARTICLES

The Importance of IoT Platforms Through the Eyes of an MVNO

Article | March 16, 2020

IoT has a massive scope and too many requirements that can leave even the best of telecom operators clueless. With exalted predictions in the near future (some estimate that IoT devices will cross the 40 billion mark by 2025), the pressure on IoT service providers is immense. There is a need to automate the management of connected devices and sensors, which is why a comprehensive IoT platform has become the need of the hour. Every single one of these platforms plays a huge role in the overall functioning of sensors and devices that form the entire IoT universe. An IoT platform serves as a middleware that connects devices/sensors. It contains an assortment of functions such as controllers and sensors, a communication network, a gateway device, translating and data analysis software along with end application services. IoT platforms are equipped to handle vast quantities of data, applications, subscribers, websites, sensors and devices, and at the same time triggers actions according to the input, in real-time.

Read More

Automotive Cyber Security: A Crash Course on Protecting Cars Against Hackers

Article | March 26, 2020

Modern cars have dozens of computers on board, and they’re not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering, brakes, and the engine itself. This is why automotive cyber security is essential. If a vehicle’s computer systems aren’t properly protected, hackers can steal data or even take control of the vehicle. As you can imagine, that makes automotive cyber security a major concern for consumers, auto companies, and OEMs alike. But what is there to know about automotive cyber security? We’ll explore what cybersecurity in the automotive industry entails and what the biggest threats are to automotive IoT and connected vehicles. We’ll also share some insights from a recent webinar by Sectigo and Mentor Graphics on how to protect connected vehicles from emerging cybersecurity threats.

Read More

Internet of Things (IoT): The Need for Vendors to Address Security

Article | March 3, 2020

By the end of this year there will be 5.8 billion Internet of Things (IoT) endpoints, according to Gartner. And depending on how IoT devices are counted the number is even higher. Statista, for example, estimates the device count for 2020 to be more than 30 billion. Security remains a big challenge for IoT as a strategy to be successful. IoT devices are still not being designed with security as a top priority.Mary O’Neill, VP of security at Nokia, noted in a press conference at MWC Los Angeles 2019 and reported by SDXCentral, that “if an IoT device today is plugged into the network and it doesn’t have protection on it, it’s infected in three minutes or less.”Jake Williams, founder of the security firm Rendition Infosec, said that “IoT vendors emphasize, often rightly, that their products improve quality of life, but they often neglect to disclose the risk of these devices to consumers. The onus of understanding how an IoT device might impact security should not be purely on the consumer. The vendor shares this responsibility.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 20, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

Spotlight

IoT M2M Council (Formerly International M2M Council)

The IMC is operational since early 2014 and already counts 12,000 OEMs and enterprise users that deploy IoT solutions as Adopter Members, gaining almost 300 of these individual associates weekly, making it the largest and fastest-growing professional group serving the IoT/M2M sector. The IMC brings together M2M Solutions Providers – its Sustaining Members – with Adopters of IoT/M2M technology on every continent of the globe. IMC Adopter Members come from operations, product design, sales & marketing, or IT, and across vertical markets like energy, healthcare, automotive, logistics, building & construction, manufacturing, and more.

Events