Adapting Proven Technology to Counter IoT Threats (2017)

By Petr Peterka, Verimatrix

The Internet of Things (IoT) is emerging fast from hype to reality across homes, enterprises, cities and infrastructures, creating massive opportunities in multiple sectors. But inevitably, given the associated proliferation in IP connected objects and services, it generates new security threats at different levels from minor nuisances to major national security threats. This has created a view that radically different technologies and strategies are needed to counter threats in this new security landscape. Verimatrix challenges this notion by arguing that although some of the threats may appear novel, they involve many techniques around theft of credentials and denial of service that are already well known. As a result, existing technology well proven in other spheres, especially pay TV revenue protection, can be adapted to counter these threats. While new threats are of course arising all the time and require constant vigilance on the part of security providers to counter, the required innovation is already taking place. Security firms such as Verimatrix are investing in AI, Machine Learning and other advanced techniques designed to provide early warning of emerging attacks so that they can be anticipated in advance, or at worst,countered as they unfold before significant damage has been done. Above all, the key to protecting the IoT lies in renewable security which is essential to stay ahead in the arms race against hackers and pirates.

By clicking the "Download Paper" button, you are agreeing to our terms and conditions.

Similar Papers

RDK + CA/DRM: Enhancing Interoperability For Robust Revenue Security
By Petr Peterka, Verimatrix
Low Power Wide Area Technologies for IoT Use Cases: Technology Assessment for MSOs
By Joe Walsh, inCode Consulting
A Method and Framework for IoT Network Security
By Umamaheswar Achari Kakinada, Dr. Hossam H. Hmimy & Manish Jindal, Charter Communications Inc.
Interactive TV Applications: Standard APIs for Digital TV Receivers
By Petr Peterka, General Instrument Corporation
Implementing a Behavioral Analysis Approach to Thwart IoT Attacks
By David Yates, Guavus, A Thales Company
The Evolution Of Cellular IoT
By Hani Beshara, Ericsson Inc.
IoT for Peace of Mind
By Arun Ravisankar, Comcast Corporation
Navigating IoT Technologies, Standards and Frameworks for Managed IoT Service
By Gary Gutknecht, Technicolor
Pairing IoT and AI to Reduce Network Maintenance Costs
By Goutam Agarwal, Rogers Communications; J. Clarke Stevens, Independent Consultant
Security and Privacy IoT Vulnerabilities: The Danger of Too Many Entry Points
By Mangesh Bhamre, Plume Design, Inc.
More Results >>