Telco’s M2M Services Need Defense Options Against Hacked IoT Devices

Subscribe To Read This Insight

1Q 2018 | IN-5013


Hackers Targeting Vulnerable IoT Devices


Telcos have introduced machine-to-machine (M2M) rate plans to attract new Internet of things (IoT) applications based on low monthly fees around low per-node traffic expectations. However, a consequence of a targeted distributed denial of service (DDoS) attack being implemented on hacked IoT devices  is that it can create a surge in message traffic that compromises both telcos’ capacity to support subscription clients and consumes the host victim device’s bandwidth. The typical IoT use case of a constrained device with a carefully designed power management for a long expected life cycle may have the battery drained in generating the hacker’s messages. So, the IoT device victim will face a compromised devices as well as potential service fees in addition to the disruption caused to the actual target victim.

Can IoT Device Security Be Tested and Certified?


The telcos have established significant test and certification processes for devices to be granted the coveted …

You must be a subscriber to view this ABI Insight.
To find out more about subscribing contact a representative about purchasing options.