M2M Security – War Texting Attacks

March 1, 2016

Wireless machine-to-machine (M2M) applications are usually comprised of three distinct parts: the vertical specific M2M devices, the wireless and wired communication networks and the central M2M backend server. M2M devices typically include a microcontroller to run the customer-specific M2M application, peripheral devices or sensors that are connected to the controller, and a cellular communication module in combination with a machine identity module (MIM), which establishes remote communication with the M2M server via wireless networks. All elements of an M2M solution can be the target of attacks. Only an integrated security approach, beginning with the system design phase and considering the entire end-to-end security chain, can effectively prevent M2M attacks and reduce risk to the M2M solution.

Spotlight

HFS Research

HFS is a unique analyst organization: We combine deep expertise with rapid, demand-side analysis of the Global 2000 to create a visionary narrative on the interplay between business operations and technology. We provide tailored, innovative insights to help you solve problems, make critical decisions, and realize long-term value on your journey to the new.

OTHER WHITEPAPERS
news image

IoT Edge Controller

whitePaper | November 14, 2019

The Internet of Things (IoT) affects many industries as connected devices streamline business processes and add entirely new revenue streams for global organizations. By creating strong trusted relationships between things, systems, data, and people, organizations can introduce more personalized, automated, and enhanced experiences for their customers and generate new revenue streams.

Read More
news image

Satellite based LoRa unlocks Europe-wide IoT

whitePaper | April 27, 2022

Big data is the dominant economic currency in a changing world moving at an increasingly accelerated pace. The speed and frequency with which data is collected, processed, and actioned is crucial to delivering the core promise of the Internet of Things (IoT) – either saving money through optimized operations or enabling new business models to generate new revenue streams.

Read More
news image

IoT at the Edge: HOW AI WILL TRANSFORM IOT ARCHITECTURE

whitePaper | May 23, 2021

The vast amounts of data constantly collected by the billions of sensors and devices that make up the Internet of Things (IoT) can pose a serious processing challenge for businesses that rely on traditional intelligence and analytics tools. An emerging solution is to use Artificial Intelligence (AI) and machine learning to build intelligent systems that automatically gather, process, and extract actionable insights from IoT data - in real time without the need for human intervention. How are AI-enabled systems transforming IoT devices and applications at the edge, and what are some of the emerging use cases we can expect to see in the near future?

Read More
news image

How to meet the IoT security requirements of today and tomorrow

whitePaper | July 4, 2023

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a region and thus to lost revenue. However, the regulations are constantly in a state of flux. This white paper provides updated background on what governments are suggesting or requiring as well as specific details on how to implement security defenses and obtain security certifications that can satisfy current and even future government requirements

Read More
news image

Why VDI makes sense for hard-core UNIX® and Linux® engineering applications

whitePaper | July 19, 2022

By now, everyone has heard the terms desktop virtualization and VDI It seems like we’ve been pounded with marketing propaganda about these technologies from companies like VMware, Citrix® and Microsoft® since 2006. But if desktop virtualization is so good, why are most of the world’s desktops still “old-style” physical desktops and laptops?

Read More
news image

AWS Prescriptive Guidance - Building an industrial Internet of Things (IIoT) digital transformation strategy

whitePaper | June 20, 2022

The industrial Internet of Things (IIoT) refers to the use of internet-connected sensors and devices in the industrial sectors, such as manufacturing, energy, automotive, healthcare, life sciences, and agriculture. IIoT allows telemetry data collection from equipment, machines, and field devices in an operational environment. These environments are commonly subject to industrial regulations; compute, networking, and power constraints; and inclement conditions, and all of these challenges contribute to the complexity of designing an IIoT solution.

Read More

Spotlight

HFS Research

HFS is a unique analyst organization: We combine deep expertise with rapid, demand-side analysis of the Global 2000 to create a visionary narrative on the interplay between business operations and technology. We provide tailored, innovative insights to help you solve problems, make critical decisions, and realize long-term value on your journey to the new.

Events