IoT Is Still Centralized And Vulnerable, What’s The Solution?

In 2018, the Internet of Things market has seen the total number of IoT devices that are in use rise to seven billion. According to iot-analytics, this figure is expected to increase threefold by 2025. Despite such indicators, the Internet of Things still has to solve problems regarding centralized platforms’ vulnerability.

IoT platform as a bottleneck

The complexity of cyber-physical systems is rising. Autonomous machines are becoming able to make their own decisions based on a set of accumulated data about a company or customer. Therefore, there is an emerging issue with how to ensure data integrity. The data subject’s location, financial data, and information relating to personal life may end up in the hands of people or companies acting in bad faith. Linking data and accounts to one’s smartphone also carries a threat. Access to IoT – be it to the washing machine or the garage lock – is usually tied to one handy device which can be stolen or lost.

Examples of Major Challenges

As the Internet of Things collects huge amounts of data, storing this data in a centralized way in itself remains one of the major challenges. As an example of the consequences of storing customer data’ insecurely, iot-analytics provides a case with a UK based telecom and internet provider that was subjected to several cybersecurity breaches where customers’ data was exposed. Hackers were able to easily access and steal millions of customers’ credit card and bank details during a sustained cyber attack.

In September of this year, a big leak by a Brazilian online booking system exposed personal data of almost 500,000 people. A month later, what appeared to be a collection of personal records compiled by the Federation of Industries of the State of Sao Paulo, the largest class entity in the Brazilian industry representing around 130 thousand industries in various sectors was exposed. The records reportedly contained the personal details of Brazilian citizens such as: names, personal ID numbers, full addresses, emails and phone numbers.

1 2 3
View single page >> |

Disclaimer: Don’t forget to complete your risk management due-diligence before developing your investment strategy.

How did you like this article? Let us know so we can better customize your reading experience. Users' ratings are only visible to themselves.


Leave a comment to automatically be entered into our contest to win a free Echo Show.