Telco’s M2M Services Need Defense Options Against Hacked IoT Devices
Telcos have introduced machine-to-machine (M2M) rate plans to attract new Internet of things (IoT) applications based on low monthly fees around low per-node traffic expectations. However, a consequence of a targeted distributed denial of service (DDoS) attack being implemented on hacked IoT devices is that it can create a surge in message traffic that compromises both telcos’ capacity to support subscription clients and consumes the host victim device’s bandwidth. The typical IoT use case of a constrained device with a carefully designed power management for a long expected life cycle may have the battery drained in generating the hacker’s messages. So, the IoT device victim will face a compromised devices as well as potential service fees in addition to the disruption caused to the actual target victim.
To find out more about subscribing:
- Helium in 2019: Can it Create a Community of Believers?
- Internet of Everything Market Tracker
- Orange's Veolia Win Shows There Are Legs in LoraWAN despite LTE-M and Sigfox Challenge
- The New Space Race: How Nanosatellite Startups Will Impact the IoT Connectivity Landscape
- Commercial Building Automation: Wired and Wireless Control in Building Automation and Building Management Systems