News & Press: Industry News

The Internet of Hackable Things

Thursday, August 31, 2017   (0 Comments)
Posted by: ACEDS Marketing Team
Share |

Extract from Nicola Dragoni, Alberto Giaretta and Manuel Mazzara's article "The Internet of Hackable Things"

1 The IoT Tsunami 
In the last decade, we all have witnessed a turmoil of interest around the Internet of Things (IoT) paradigm. It has been claimed that such a paradigm may revolution our daily lives and pervasive applications are behind the corner both in the civil and military complex. Such a strong hype on pervasive technologies requires a step back to consider the potential threat on security and privacy. First of all, What exactly is the IoT? Accordingly to the Online Oxford Dictionary it is the “interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receiving data”. To get a grasp of the dimension of this phenomenon, according to Evans Data Corporation the estimated population of IoT devices in June 2016 was 6.2 billion [1], number that according to several predictions will grow as up as 20 billion in 2020 [2]. Projections and data are not so straightforward to analyse since some firms take into account devices like smartphones, while others do not count them, therefore it is quite hard to make comparisons. Nonetheless, the growing trend is confirmed by every analyst, to the point that by 2025 the IoT market could be worth $3.9 trillion to $11 trillion per year [3]. On the academic front, this ongoing excitement and interest in all the IoT world has given rise to an increasing number of related conferences, research projects and research centres (like the recently formed IoT Center in Denmark,

As a matter of fact, even though IoT refers to an ample variety of different devices, these devices all share a common architecture. First of all, any IoT device usually connects to the Internet through a more powerful gateway, which could be a smartphone or a tablet. Then data flow is elaborated by (and eventually hosted into) the cloud, enabling the end user to remotely connect to the device and control it. Figure 1 shows how this IoT architecture looks like in a generic scenario.


Read the full article here

What our customers say?

©2018 Association of Certified E-Discovery Specialists
All Rights Reserved