Why the IoT industry should move beyond DNS and create its own IP address registry of devices

| December 5, 2016

article image
In today’s market, segments of the broader IoT ecosystem have been under-served, especially small-to-medium businesses (SMBs) and mid-sized cities. However, this oversight will change over the next several years as these entities seek to embrace the efficiencies and cost reductions that enterprises and government agencies are achieving through IoT implementations.

Spotlight

Marici Technology Solutions

Marici Technology Solutions is a Seattle-Based Software Solutions company that specializes in .Net and PHP as its main development platforms. We have worked in several verticals ranging from eCommerce to IOT (consumer and non-consumer) to large, enterprise-class applications.

OTHER ARTICLES

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 20, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

How Big Data and IoT Are Connected

Article | March 20, 2020

Big data as a term and a field, has been around for some time. It relates to the ways in which we study, analyze and process data sets that are too large to be handled by traditional data-processing software. Data can be described as ‘big’ when it demonstrates the four ‘V’ qualities: veracity (accuracy), velocity (speed), volume (size) and variety (both structured and unstructured). IoT, on the other hand, came much later and relates to devices, data and marrying them together. This area looks at making devices ‘smart’ (anything from watches to kettles) and collecting data about their performance or usage to influence consumer behavior.

Read More

THE FUTURE OF BIOMETRICS IOT

Article | March 20, 2020

In 2018 when Apple unveiled its iconic iPhone X with a feature to unlock the phone with Face ID thereby eliminating the use of the home button, it met a lot of eye-rolls. Fast forward to now, people are in love with the biometrics enabled technologies. While iPhone X had a unimodal authentication system, gadget these days have updated themselves in a better way. Let’s try to have a better understanding of the Biometrics. Biometrics are a way to measure a person’s physical characteristics to verify their identity. It can be physiological traits, like fingerprints and eyes, or behavioral traits, that define the manner an individual respond to stimuli. These characteristics are unique to the person. Once collected the data compared with the pre-existing database to find a match. Accordingly, it then produces an outcome. There are many varieties in which this data is collected. Facial and voice recognition, iris and finger scanner, signature verification, hand geometry, keystroke, gait detectors are some of the examples.

Read More

Frailties of LoRaWAN IoT Devices

Article | March 20, 2020

Low-power wide-area networks (LPWANs) are helping drive the Internet of things (IoT) explosion. They connect millions of low-power IoT and Industrial IoT (IIoT) devices into wireless networks over a range of distances, from short to really, really long, from indoor applications to those covering large fields or even cities. But device designers using the LoRaWAN standard may be lulled into thinking that just configuring its security keys is enough to prevent their devices from being hacked. A new report says it isn’t. Four protocols give enterprises a choice in LPWAN connectivity: cellular NB-IoT, LTE-M, and Sigfox, and the non-cellular LoRaWAN standard. Among these, the open LoRaWAN overwhelmingly dominates. Omdia (formerly IHS Markit – Technology) projects a “quite high forecast” for LoRa, said Lee Ratliff, senior principal analyst, connectivity and IoT.

Read More

Spotlight

Marici Technology Solutions

Marici Technology Solutions is a Seattle-Based Software Solutions company that specializes in .Net and PHP as its main development platforms. We have worked in several verticals ranging from eCommerce to IOT (consumer and non-consumer) to large, enterprise-class applications.

Events