On Monday, security researchers revealed the existence of several major security vulnerabilities that could be exploited to steal sensitive information shared by users connected to a wireless network. The exploits--known as Key Reinstallation Attacks or KRACK --affect Wi-Fi Protected Access 2 (WPA2), a protocol that is the current industry standard for encryption that is used to secure traffic on Wi-Fi networks. KRACK attacks, which take advantage of a fundamental flaw in the way devices and access points communicate and handle encrypted data, put essentially every Wi-Fi enabled device at risk--though the internet-connected devices that make up the Internet of Things are of particular concern. While many vendors have already quickly moved to offer up a fix for the vulnerabilities--Microsoft has already issued a patch, Apple addressed the issue in earlier versions of its mobile operating system and Google is already concocting its fix for Android--IoT devices are notoriously slow when it comes to addressing security problems. "There might be a lot of [Internet of Things] devices that might not receive a patch in the near future," Candid Wueest, a threat researcher at security firm Symantec, told International Business Times.
According to Juniper Research, the number of IoT (Internet of Things) connected devices will number 38.5 billion in 2020, up from 13.4 billion in 2015: a rise of over 285 percent. Consumer IoT, especially as it relates to the smart home, has received significant attention, especially because of the prevalence of online gaming, video streaming, home audio and home video security systems. With the new year on the horizon and smart home devices set to remain among the top purchases in 2020, this article focuses on the top reasons that devices are expected to malfunction over the next 12 months. IoT is rapidly becoming a transformative force, delivering the digital lifestyle to billions of people. Integrating an amazing array of smart devices with internet connectivity, the IoT market already includes more than 25 billion devices in use.
While the Basic Management of IoT devices has once been reduced by many providers of IoT solutions ( as such features have not offered a short – term differentiation for IoT solutions), as the IoT industry is still mature, such features are becoming increasingly important. However, with the internet of things, we see IoT solutions that can include thousands to millions of devices, for which persistent connectivity and high bandwidth are far from the norm. Without the Management of Contextual IoT devices, managing thousands to millions of devices for which you have very little data can quickly become an operational nightmare capable of eliminating any hope of a good return on investment and killing an IoT solution. IoT Device Management is all the tools, capabilities and processes needed to support IoT solutions on a scale effectively. Adding new devices to any network makes it more complex, and IoT devices are particularly dangerous.
In this series, I explore strategic opportunities in quantum computing and how it can give IoT a leap like never seen before. I will expound on the possibilities, current limitations, and breakthroughs needed to reach a state practical for the industry at large. I will also present implications to business models, computing, security, communication, networking, and more. There are pervasive obstacles and challenges in the Internet of Things that's hampering broad-based adoption across industries. In addition, there is widespread disagreement and fragmentation regarding IoT standards and protocols among device manufacturers.
As organizations let billions of connected devices into their corporate networks, do they really know what those devices are made of and the risk they may pose? The answer is likely: not really. That's because of the complicated supply chain of Internet of Things (IoT) and operational technology (OT) devices. While a company may buy a device from a manufacturer it knows and trusts, it may not realize that some of the underlying software and components that could be used to compromise those devices are likely made by another manufacturer. In the case of the recently disclosed Ripple20, 19 vulnerabilities were discovered in the TCP/IP networking stack made by Treck that can be found in millions of common devices from major vendors, including industrial control systems, medical devices, enterprise networking equipment, and printers.