Internet of Things

Fri
12
May

Data Privacy in IOT

Data Privacy in IOT

One of the most interesting transformations happening in the world is the adoption of IOT – internet of things - Automation (control) and monitoring of all things in our daily use by connecting these activities to the internet. Already existing real life cases include monitoring of automobiles’ health by auto companies, security monitoring and regulating home appliances, patient health monitoring etc.

Tue
08
Nov

What exactly is the Internet of Things (IoT) and how it’s improper management affecting the security?

What exactly is the Internet of Things (IoT) and how it’s improper management affecting the security?
IoT is ever growing network of physical objects that possess an IP address, for internet connectivity and the communication occurs between these objects and other Internet-enabled devices and systems.
 
Devices are embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices over a network. 
 
The Internet of Things provides a way to use collected data from sensor devices and various cloud solutions to gather, analyze, and act on data. IoT aims at connecting all potential objects which interact each other on the internet to provide comfort life for human.
 
Thu
07
Jul

Internet of Things (IoT) – Security Challenges

Internet of Things (IoT) – Security Challenges

The Internet of Things i.e. IoT is swiftly grabbing entire world and holds the potential to empower and advance nearly each and every individual and business. A large number of IoT applications deal with sensitive infrastructures, strategic services such as the distribution of water and power, or handle sensitive information about people, such as their location and movements, or their health and purchasing preferences , Transport Services including  Vehicle Management  and the list go on .  Hence, security plays an important factor on an IoT implementation.

Wed
24
Feb

Securing Internet of Things

Securing Internet of Things

There has been many revolutions in the world – political, social, industrial etc. The invention of internet has also been considered as an important revolution in the modern world. This revolution has been so powerful that today we can’t imagine a life without internet. Speed of internet has increased. Variety of devices has increased. For instance, during the early days, it was only a desktop through which we would connect to internet. Now, we have a whole lot of devices like laptop, tablet, smartphone, smartwatch and smart appliance too.

Tue
23
Feb

How secure is Internet of things?

The digital five forces (Mobility-Pervasive computing, Big Data, Social Media, Cloud, Internet of Things) had made their impact significantly throughout the world individually. But from few years ago, these forces were combined and enforced to digitalize many services and processes completely.The primary force responsible for this vast automation of services is the Internet of Things (IoT). It is described by Ramirez as “moving small packets of data to a large set of nodes so as to connect and automate everything from home appliances to business applications. Tech Giants speculate that in 2020 there will be more than 40 billion connected devices, including smart wearable’s, connected vehicles and also connected homes.

Tue
23
Feb

Internet of things - The more we connect, the more we grow

Our world has started to follow the slogan “the more we connect the more we grow”. Internet of Things (IoT) is another example of this. Internet of Things has made things easy and fast. Internet of Things is used in home automation, health control system, kitchen appliances, smart cities, thermostats, transportation system, energy management, intelligent shopping system etc. As we all know everything in this world has two phases, one positive and one negative. We enjoy the positive aspect of Internet of Things very much but only a few know much about negative aspect. There exists an element called Hacker in our physical world that never leaves a chance to threaten us in the cyber world. Internet of Things has many security threats as well. There are many electronic devices in our house that can be used against us.

Fri
22
Jan

Internet of Things (IoT), IPv6 and security challenges

Internet of Things (IoT), IPv6 and security challenges

What is internet of things?

"Things," in IoT sense can refer to a wide spectrum of devices ranging from driverless cars to automatic jets, smart homes to smart cities, health monitoring implants to biochips on farm animals. The list goes on and they all come under one umbrella embedded with software, electronics, sensors and network connectivity.

Where it is now and how is it moving?

As per the report published by OECD (Organization for economic co-operation and development), South Korea leads the list of countries by IoT devices online per 100 inhabitants with a count of 37.9 devices followed by Denmark, Switzerland and United States.

Tue
29
Dec

Censys for Internet of Insecure things?

Censys for Internet of Insecure things?

It was few days ago I read about a new search engine called Censys. I went to its website to have a look for more details.

Censys is a search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet. Driven by Internet-wide scanning, Censys lets researchers find specific hosts and create aggregate reports on how devices, websites, and certificates are configured and deployed.” states the description on the Censys official website.

I was confused whether it is good or bad. I have read about hacker's search engine "Shodan" before and it was to locate the devices that were carelessly plugged into the internet. Before making a judgement, I wanted more details. I went through different websites to collect more information.

Mon
14
Sep

IoT – Handle with care

Internet of Things

Internet of Things (IoT) device connects to internet automatically for sending or receiving data or to control some operations. The trend to use IoT is increasing very rapidly to enhance efficiency or convenience by business and home users, which is also increasing risk of cyber threats and gives opportunities to cyber criminals to enter into protected network or, still sensitive information or observer human lifestyle. Before using this new technology, it is significantly required to understand its vulnerabilities, risks and safeguards also user awareness on this is highly important to control the cyber-attacks.

Let us understand few examples of IoT devices. IoT device can be

Pages

Subscribe to RSS - Internet of Things