LONDON -- Mobile Network Security Strategies -- The rise of machine-to-machine communications will cause a change in how operators approach network security because of the specific requirements that underpin the future of an Internet of Things (IoT).
Anders Wittfeldt, IoT cloud architect at Telenor Connexion -- a title that already screams "futuristic" -- laid out what he sees as some of the requirements for delivering end-to-end security in an M2M world at Light Reading's security event Wednesday.
"M2M is now rapidly entering the public consciousness and that makes our deployments more vulnerable," Wittfeldt noted.
He had several suggestions about what M2M operators should expect to support with end-to-end security.
Wittfeldt favors AES (advanced encryption standard) encryption for M2M security. "It can be implemented in most resource-constrained environments," he says.
"AES 256 is very unlikely to be cracked in our lifetime," the Telenor cloud creator said, adding that it is less resource-hungry than the RSA equivalent.
Wittfeldt suggests that the "relaxed approach" the industry has taken to M2M so far has helped it grow. Now, he believes, is the time to tighten up security as M2M starts to enable the Internet of Things. (See Does M2M Need LTE?)
— Dan Jones, Mobile Editor, Light Reading