Stacey Higginbotham’s recent article The internet of things needs a new security model. Which one will win? and Mark O'Neill's article Top 10 Things to Consider accurately describe the new demands on security that the Internet of Things presents. In order to reap the benefits of the IoT, users must be confident in the technology that supports it. This is a challenge to development teams to understand the end-user environment, the applications, the security risks and the value of a solution. The security challenge is a legitimate concern, and echoes the same concerns that many had about using wireless connectivity a decade ago. At that time, examples of rogue sniffers stealing signal and credit card information were rampant and news spread quickly about cracking first-generation security algorithms.
In a few short years, wireless networks added authentication and encryption to be compliant with stringent NTIA, JITC, UC APL, and FIPS 140-2 standards. These wireless broadband solutions provide reliable secure connectivity for federal agencies including military and border patrol. Closer to home, we connect complex wireless city-wide video surveillance cameras that enable public safety officers and first responders more effective to keep all of us safe. Experience matters. With our foundation in developing secure wireless broadband connectivity, we can leverage our field experience into making connectivity as reliable as end users need it to be.