Companies that want to build their internet of things strategy can gain valuable insights from studying IoT solutions that are already in play.
From space, America’s rail system looks like a slice of brain tissue, with brightly lit train hubs and spokes standing in for neurons. Bit by bit, it’s starting to behave like one. Take GE’s newest locomotive, the Tier 4, which is essentially a rolling data center. It carries more than 200 sensors that collect gigabytes of …
Guest Post by Kevin Bromber - Over the past couple of years, there has been a lot of hype around the Internet of Things. Every major analyst suggests that Internet-enabled devices will change all industries and all businesses on the face of this earth. IDC forecasts that the worldwide market for IoT solutions will grow from $655 billion in 2014 to $1.7 trillion in 2020. Cisco believes the category is a $14.4 trillion dollar industry.
The security of the Internet of Things is fundamentally broken. Developers and manufacturers understandably are eager to get their new hi-tech products to market and unfortunately often overlook security, instead operating under the misapprehension that security-by-obscurity in their proprietary systems will do. The problem is that security researchers, and those with more malicious intent, can almost always extract binary code from the device memory via JTAG or similar in-circuit debugging facilities, or find it online in the form of updates, and reverse engineer via one of the many tools readily available.