A talk at Hardware Pioneers 'Creating a successful IoT product' covered how the MediaTek LinkIt™ portfolio of IoT platforms can help you take your IoT idea to prototype to product.
13. IoT under attack
13
VULNERABILITIES
Control Theft Disruption
Controls for smart
locks or lights
Malware infected
white goods Unlock doors
remotely
Backdoor to
Other systems
Hacked vehicle
control systems
Pacemakers
are vulnerable
Fitness devices
know your location
Insulin pumps
can be targeted
17. Potential security consequences
17
▪ There are a number of costs associated with
security risks
• Customers lose privacy
▪ Cyber crime increases
• Private data such as bank and credit card
information
▪ IoT expansion will extend this to health, location,
surveillance, etc
• Compromised internet enabled devices
▪ Sending spam, spoof data, harvesting and using stolen
credentials and DoS attacks
• M2M activities with no human oversight
▪ Customers lose trust and take business
elsewhere
18. Considerating Big Data
Data is the new currency
• User data access may require value add from suppliers
Data security – sensitive data
• Data transmission
• Data retention
Regional variations
Operational considerations
• Dependent upon solution
Connectivity
Latency
Performance / battery
• Is it always appropriate? 18
19. Capture & analytics
Verizon research indicates that only around 8% of companies are
using more than 25% of the data they capture
The potential to analyse not just obvious data but related
information enables additional business intelligence to be
generated
• Supports machine learning
• Greater customer insight
• Trend analysis
• May be your differentiating service!
19
20. Cloud vs. local
Some actions prompted by
data need to be immediate
• Context is critical
Clean and/or encrypted
information
20
22. Whenispowermanagementimportant?
22
It should always
should be considered a
crucial feature
• Alongside areas such
as security
• Even if the scenario
doesn’t appear to
require careful
power management
• Not just for items
such as wearables or
smartphones
23. Identifyingpower savingopportunities
Need to identify all possible behaviors
• Use-case modelling
• Likely areas of compromise vs non-
negotiable behavior
Power mode flows
• Including transitions from one-state to
another
Connectivity
• Which protocol best suits usage?
• Always-on?
23