x
Mobile security

Telenor Connexion: Securing the Internet of Things

LONDON -- Mobile Network Security Strategies -- The rise of machine-to-machine communications will cause a change in how operators approach network security because of the specific requirements that underpin the future of an Internet of Things (IoT).

Anders Wittfeldt, IoT cloud architect at Telenor Connexion -- a title that already screams "futuristic" -- laid out what he sees as some of the requirements for delivering end-to-end security in an M2M world at Light Reading's security event Wednesday.

"M2M is now rapidly entering the public consciousness and that makes our deployments more vulnerable," Wittfeldt noted.

He had several suggestions about what M2M operators should expect to support with end-to-end security.

  • Systems that use multiple network technologies: As well as 2G and 3G, Wittfeldt is expecting M2M players will need to support WiFi, Bluetooth, Ethernet connections, and more.

  • Operators running M2M connections will need to support and manage a multi-vendor ecosystem.

  • Lightweight encryption is necessary for low-bandwidth devices and networks.

    Wittfeldt favors AES (advanced encryption standard) encryption for M2M security. "It can be implemented in most resource-constrained environments," he says.

    "AES 256 is very unlikely to be cracked in our lifetime," the Telenor cloud creator said, adding that it is less resource-hungry than the RSA equivalent.

    Wittfeldt suggests that the "relaxed approach" the industry has taken to M2M so far has helped it grow. Now, he believes, is the time to tighten up security as M2M starts to enable the Internet of Things. (See Does M2M Need LTE?)

    — Dan Jones, Mobile Editor, Light Reading

  • Be the first to post a comment regarding this story.
    HOME
    Sign In
    SEARCH
    CLOSE
    MORE
    CLOSE