Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
How Does IoT Work?
Get Data—Securely—to the Right Place, at the
Right Time, in the Right Format
“
”
CHALLENGES
SENSING A COMPLEX
ENVIRONMENTS
Immediately detecting the drop off in network
of IoT device and ones it comes back online
#1
Immediately detecting the drop off in network
of IoT device and ones it comes back online#1
#2 Ability to detect and monit...
Connectivity
Variety of wired and wireless connectivity
standards are required to enable different
application needs
#1
Thousand of IoT devices signaling and sending
data between one another takes a toll on power
and we cannot afford to use 1...
- Should have minimal battery drain and low power
consumption
Power consumption
#1
Thousand of IoT devices signaling and s...
Security
Authorization: IoT device or server has proper
authorization to send or receive that stream
of data
#1
Open ports: An IoT device is dangerously
vulnerable when it’s sitting and listening to an
open port out to the Internet
#1...
Encryption: You need end to end encryption
between devices and servers.
#1
#2
#3
Open ports: An IoT device is dangerously ...
IoT complexities
IoT application development needs to be easy
for all developers, not just to experts#1
Demand a whole new level of systems and
capabilities that can harness the ecosystem
and unlock value for organizations
#1
...
Cloud is important
A virtual infrastructure for utility computing
integrating applications, monitoring devices,
storage de...
A virtual infrastructure for utility computing
integrating applications, monitoring devices, storage
devices, analytics to...
EXPONENTIAL GROWTH OF SMART
DEVICES AND SENSORS
Source: cognizant
Keep following us
for More
We are ChromeInfo Technologies, a Mobile App Development, Web
Development and Software Testing company with development ce...
For more follow us
THANK YOU
Our Most viewed slide
TOP 6 Security Challenges of Internet of Things
Upcoming SlideShare
Loading in …5
×
Upcoming SlideShare
Internet of Things and Security challenges
Next
Download to read offline and view in fullscreen.

6

Share

Download to read offline

TOP 6 Security Challenges of Internet of Things

Download to read offline

Internet of Things (IoT) devices are everywhere, and they're not going away any time soon.Here are some Security Challenges of IoT. #ChromeInfotech

1. How does IoT works?
2. What are the top security challenges that a mobile application developers face?
3. What are the challenges that IoT brings to mobile developers?

Related Books

Free with a 30 day trial from Scribd

See all

TOP 6 Security Challenges of Internet of Things

  1. 1. How Does IoT Work? Get Data—Securely—to the Right Place, at the Right Time, in the Right Format “ ”
  2. 2. CHALLENGES
  3. 3. SENSING A COMPLEX ENVIRONMENTS Immediately detecting the drop off in network of IoT device and ones it comes back online #1
  4. 4. Immediately detecting the drop off in network of IoT device and ones it comes back online#1 #2 Ability to detect and monitor IoT devices and fix any problems SENSING A COMPLEX ENVIRONMENTS
  5. 5. Connectivity Variety of wired and wireless connectivity standards are required to enable different application needs #1
  6. 6. Thousand of IoT devices signaling and sending data between one another takes a toll on power and we cannot afford to use 100% consumption of these small and expensive embedded CPU Of IoT devices #1 Power consumption
  7. 7. - Should have minimal battery drain and low power consumption Power consumption #1 Thousand of IoT devices signaling and sending data between one another takes a toll on power and we cannot afford to use 100% consumption of these small and expensive embedded CPU Of IoT devices
  8. 8. Security Authorization: IoT device or server has proper authorization to send or receive that stream of data #1
  9. 9. Open ports: An IoT device is dangerously vulnerable when it’s sitting and listening to an open port out to the Internet #1 #2 Authorization: IoT device or server has proper authorization to send or receive that stream of data Security
  10. 10. Encryption: You need end to end encryption between devices and servers. #1 #2 #3 Open ports: An IoT device is dangerously vulnerable when it’s sitting and listening to an open port out to the Internet Authorization: IoT device or server has proper authorization to send or receive that stream of data Security
  11. 11. IoT complexities IoT application development needs to be easy for all developers, not just to experts#1
  12. 12. Demand a whole new level of systems and capabilities that can harness the ecosystem and unlock value for organizations #1 #2 IoT application development needs to be easy for all developers, not just to experts IoT complexities
  13. 13. Cloud is important A virtual infrastructure for utility computing integrating applications, monitoring devices, storage devices, analytics tools, visualization platforms, and client delivery #1
  14. 14. A virtual infrastructure for utility computing integrating applications, monitoring devices, storage devices, analytics tools, visualization platforms, and client delivery Systems in the cloud will be used to transform data to insight and drive productive, cost-effective actions from these insights #1 #2 Cloud is important
  15. 15. EXPONENTIAL GROWTH OF SMART DEVICES AND SENSORS Source: cognizant
  16. 16. Keep following us for More
  17. 17. We are ChromeInfo Technologies, a Mobile App Development, Web Development and Software Testing company with development center in India. ABOUT Us Mobile Application Development Android Application Development iPhone Application Development iPad Application Development Web Development Software Testing OUR OFFERING
  18. 18. For more follow us
  19. 19. THANK YOU
  20. 20. Our Most viewed slide
  • osrasheed

    Sep. 27, 2017
  • nidhi_chrome

    Nov. 26, 2015
  • SakshiGupta115

    Oct. 12, 2015
  • choeungjin

    Oct. 9, 2015
  • HanaJeon1

    Sep. 18, 2015
  • ChromeInfotech

    Sep. 18, 2015

Internet of Things (IoT) devices are everywhere, and they're not going away any time soon.Here are some Security Challenges of IoT. #ChromeInfotech 1. How does IoT works? 2. What are the top security challenges that a mobile application developers face? 3. What are the challenges that IoT brings to mobile developers?

Views

Total views

5,110

On Slideshare

0

From embeds

0

Number of embeds

338

Actions

Downloads

146

Shares

0

Comments

0

Likes

6

×