Why do you need a trusted device?

Reading Time: 2 minutes

To secure devices and the data they generate, store, and transmit from the chip all the way to data reaching the cloud, security must begin even before establishing the root of trust. By 2035, there are expected to be one trillion linked devices, yet security is still a major concern for many businesses and consumers that are considering IoT deployment. It is such a significant issue that some industry experts believe it could hinder IoT’s projected development and related economic benefits. According to study released by Bain & Company in October 2018, 45% of executives from surveyed organizations said that protecting IoT was their top concern.

A significant finding of the study was that customers would be ready to spend 22% more for secure devices and purchase 70% more of them. It also recognized device security as a critical component in protecting the data that these devices generate, store, and transfer. According to Bain, this would cause the market for IoT cybersecurity to increase from US$9 billion in 2018 to US$11 billion in 2020. In a September story regarding IoT security in The Economist, it was noted that Arm and Intel had taken steps to strengthen devices by incorporating security into their chips.

Clearly, the development of SIM technology, particularly the embedded SIM (eSIM) standard from the GSMA and the integrated SIM from Arm, will be crucial in assisting with the security of cellular IoT devices (iSIM). However, a poll of 650 executives revealed there is significant opposition to and a lack of awareness of them, as Vincent Korstanje, the vice president and general manager, Emerging Businesses at Arm, emphasized in August.

According to the poll, the three biggest barriers to major commercial eSIM deployments are resistance from established stakeholders (69% of respondents), the perception that eSIM deployment is difficult to deliver (40%), and worries about getting trapped into a contract (40%).

In addition, whereas 90% of respondents were familiar with eSIM, just 43% were familiar with iSIM technology. Mobile carriers, semiconductor and module producers, original equipment manufacturers (OEMs), IoT service providers, businesses, consultants, and SIM suppliers were among the responders.

The benefits of this strategy include increased security—partially due to the reduction of the attack surface to a single component—a lesser environmental impact and lower power requirements enabling cellular IoT device operation in off-grid settings at an affordable price.

Hackers who correctly predicted that the default usernames and passwords of the devices were unlikely to have been changed when they went into use and used them to carry out an organized attack on Dyn, the domain name server that maps browsers to websites, infected millions of IP surveillance cameras, printers, baby monitors, and other ostensibly innocent devices with the Mirai virus.
This is exactly why a trusted gadget produces trustworthy data.

Sources:

1)https://www.information-age.com/really-trust-trusted-devices-8664/

2)https://duo.com/blog/reducing-risk-to-the-enterprise-with-trusted-devices

3)https://patents.google.com/patent/JP4732508B2/en

Tagged

One thought on “Why do you need a trusted device?

  1. 47574 says:

    During the serious development of technology, the issue of security really remains one of the most exciting and important for all users.

Leave a Reply

WordPress › Error

There has been a critical error on this website.

Learn more about debugging in WordPress.