Welcome!

Wireless Authors: Roger Strukhoff, Elizabeth White, Hovhannes Avoyan, Liz McMillan, Pat Romanski

Related Topics: IoT Expo, Wireless, Cloud Expo, Big Data Journal

IoT Expo: Article

Internet of Things Security and Privacy Report

The Challenges and Opportunities

Research and Markets has announced the addition of the "Machine-to-Machine (M2M) Security and Privacy: Challenges and Opportunities" report to their offering.

Machine-to-Machine (M2M) applications will be developed in various sectors of the industry at a rapid pace over the next five years, reaching an inflexion point by 2020 as the Internet of Things (IoT) begins a high growth phase. With increasingly more devices connected to the Internet in which critical business processes depend, the threats to applications increase in terms of incidence, severity, and impact.

It is important to recognize that applications are susceptible to physical attacks on devices as well as network-level attacks, which in many cases have different issues and solutions. The M2M industry is quickly recognizing the need to deal with security and privacy issues pertaining to M2M, but understanding the specific issues and solutions are not broadly understood.

Key Topics Covered:

Part One: Machine-To-Machine Security

1. Exploited Vulnerabilities And Attacks

2. Security Requirements For M2M

3. Factors Leading To Complexity In M2M Applications

4. Measures To Ensure Security For M2M Applications

5. Two Points Of Attack On M2M Communications

6. Difference In M2M Communication Over Gsm And Cdma

7. Critical Device Controls By M2M Applications

8. Security An Integral Part Of Application Design

9. Sophisticated Security Mechanisms For M2M Security

10. Evolving Elements Of Security

11. Security Is One Of Many Go-To-Market Factors

12. Securing The Communications And Not Just Devices

13. Use Of Ipv6: Added Security Problems

14. Adequate Use Of Certificate For Security

15. Special Skill-Set Required For Deploying Security Tools

16. Organizations And Collaborations For Standards

Part Two: Machine-To-Machine Privacy

17. Privacy Concerns

18. Privacy And Security Concerns For Big Data

19. Privacy Issues In Cloud Computing

20. Privacy An Integral Part Of Application Design

Part Three: Industry Views On Security

21. Industry Survey On Security

Part Four: Wireless Sensor Networks

22. Introduction To Wireless Sensor Networks

23. Security Threats On Osi Layers For Wsn

24. Security Goals Of Wireless Sensor Networks

25. Challenges For Wireless Sensor Networks

26. Types Of Attacks In Sensor Networks

27. Security Mechanisms To Combat Active And Passive Attacks

28. Sensor Network Standardization

29. Conclusions

More Stories By Pat Romanski

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.