Thank you to all the new members and contributors of IoT Central. Our membership is growing quickly and we all should be excited about the community we are building. In this issue Bill McCabe looks at IoT Services, Ben Dickson explains why the ransomware threat is more serious than you think, and Sandeep Raut explores the good, the bad and the ugly of IoT. If you're interested in being featured, we always welcome your contributions on all things IoT Infrastructure, IoT Application Development, IoT Data and IoT Security, and more. All members can post on IoT Central. Consider contributing today. Our guidelines are here.
Posted by Bill McCabe
As with any new technology, businesses will need to find quantifiable benefits in the Internet of Things before the concept is embraced and implemented. It could be argued that connected devices are already being adopted on a wide scale: companies like Microsoft, Amazon, Qualcomm, IBM, and others already see IoT as a core part of their businesses. Even so, there are still some, especially small to medium sized businesses, that are weighing up the costs and benefits of ultra-connectivity in the world of the Internet of Things.
In the next five years Internet of Things communications will see unprecedented growth, and cellular connectivity will become even more valuable. Wireless cellular technologies have found enormous potential as key enablers for IoT, and the continuously increasing technology enhancements and innovations in cellular technologies are promising to be the major primary access methodologies to enable a great number of IoT applications.
By Ben Dickson
At the recent Def Con hacking conference in Las Vegas, two researchers from cybersecurity firm Pen Test Partners showed that they could inflict your smart thermostat with ransomware from hundreds of miles away, and force you to fork over cash (usually bitcoins) before you could regain control of the appliance. Ransomware has been around for a while. It’s a breed of malware that locks down access to your files by encrypting them and sells you the decryption key that will give you back access to the files. IoT ransomware is relatively new. However, this isn’t the first time that the topic of IoT ransomware has been brought up by cybersecurity experts
By Ashish Modi
To build an IOT application we required following things.
- A problem where we required IOT solution.
- Identify and design IOT based solution (Hardware + software + connection).
A problem where we required IOT solution
Nowadays everything is connected to the internet. We need to move our existing system into IOT based solution.
In this article, we focus on a framework of how you can think about this problem of standards, protocols, and radios. The framework of course depends on if your deployment is going to be internal, such as in a factory, or external, such as a consumer product. In this conversation we’ll focus on products that are launching externally to a wider audience of customers, and for that we have a lot to consider. Let’s look at the state of the IoT right now— bottom line, there’s not a standard that’s so prolific or significant that you’re making a mistake by not using it. What we want to do, then, is pick the thing that solves the problem that we have as closely as possible and has acceptable costs to implement and scale, and not worry too much about fortune telling the future popularity of that standard.