Telco’s M2M Services Need Defense Options Against Hacked IoT Devices

Subscribe To Read This Insight

1Q 2018 | IN-5013

 

Hackers Targeting Vulnerable IoT Devices

NEWS


Telcos have introduced machine-to-machine (M2M) rate plans to attract new Internet of things (IoT) applications based on low monthly fees around low per-node traffic expectations. However, a consequence of a targeted distributed denial of service (DDoS) attack being implemented on hacked IoT devices  is that it can create a surge in message traffic that compromises both telcos’ capacity to support subscription clients and consumes the host victim device’s bandwidth. The typical IoT use case of a constrained device with a carefully designed power management for a long expected life cycle may have the battery drained in generating the hacker’s messages. So, the IoT device victim will face a compromised devices as well as potential service fees in addition to the disruption caused to the actual target victim.

Can IoT Device Security Be Tested and Certified?

IMPACT


The telcos have established significant test and certification processes for devices to be granted the coveted …

You must be a subscriber to view this ABI Insight.
To find out more about subscribing contact a representative about purchasing options.

Services