网址简介：The Internet of Things (IoT) brings together end devices, from end nodes to a gateway or cloud platform, into a global network of distributed intelligence.
The IoT brings together all kinds of connected devices into a global network of distributed intelligence that opens up a new world of innovation and creativity. Many organizations are already reaping significant benefits by harnessing the data created by large-scale IoT deployments to pursue new opportunities and improve operations.
The amount of valuable data collected supports other new technologies, such as artificial intelligence and virtual and mixed reality, but not all of this data needs to be processed and analyzed in the cloud. Many organizations are choosing Arm-based technology and the powerful Arm Pelion IoT platform to run machine learning, a subset of AI, on IoT devices at the edge. The result is improved data privacy, device security, real-time insights, and lower communications costs.
IoT Security is Essential
Securing the IoT is one of the big barriers to IoT reaching its full potential. To truly protect the billions of devices entering the field, security needs to be considered at the very beginning of device design—built in from the ground up and throughout the full lifecycle of the device. As the IoT starts to fix real-world problems, the value of assets inside IoT devices will only increase, making them prime targets for hackers.
Protecting our IoT devices and assets (for example the sensor data, or encryption keys), requires careful analysis of IoT assets. We also need to consider all security threats (communication, lifecycle, physical or software attacks), ensuring informed decisions are made about the necessary counter-measures to safeguard each IoT use case. If security is not considered upfront, enterprises and users of IoT may later find deployments compromised, risking revenue, brand credibility or in some cases, life-threatening situations.