The new era of the Internet of Things, the five major misconceptions about security

With the advent of the Internet of Things era, smart devices are evolving and emerging, and the advantages of smart wireless connectivity are becoming more and more prominent, which has become the key to the success of enterprise business. The maturity of the market has brought a lot of development tools and knowledge, which has greatly accelerated the speed of innovation in the Internet of Things. Developers and product manufacturers can now more easily create new wearable devices or smart home products to make life easier and easier to control. ,higher efficiency. However, concerns about security and privacy have followed, and the Bluetooth Technology Alliance has found new product development and security in partnership with more than 27,000 member companies, including start-ups and well-known big brands. There are five major mistakes in strategy and so on. I hope this document can explain these misunderstandings to developers and let them more clearly develop Bluetooth (Bluetooth®).

Error 1: Think of safety as trouble

Early security procedures often gave developers and consumers a "trouble" feeling, which also led to some of the latest practices not being adopted in time. For example, developers often mistakenly believe that Bluetooth technology pairing is too difficult to operate, making it difficult for consumers to parry. But in fact, this situation has changed since 2004. The Bluetooth specification update makes the device connection process easier, and the security functions including encryption, trust, data integrity, and user data privacy protection can provide more complete security. Bluetooth also offers multiple options based on user requirements and device capabilities to make connections easier and safer.

Today, developers can flexibly integrate security features based on product and consumer needs, both in terms of technology and user experience. The latest version of Bluetooth 4.2 security features meets the Federal InformaTIon Processing Standard (FIPS), providing AES encryption, Elliptic Curve Diffie Hellman (ECDH) cryptosystem, and new low Power safe connection. Perhaps the implementation of many functions does not require ECDH key generation or 128-bit AES encryption, but as long as developers want to choose a more secure connection, Bluetooth is capable of achieving high levels of encryption.

Error 2: Lack of basic knowledge of wireless technology

The confusion about wireless devices stems from the lack of basic knowledge. The exaggerated descriptions of wireless data transmission, tracking capabilities, and device intelligence in sci-fi and spy movies often make people mistakenly believe that Beacon's functions are used to track others or users. But Beacon's role is just to send a broadcast signal. Depending on whether the device has received the information, the APP on the smart device can estimate the relative location of the user in the store. The user can only connect to the information after downloading and activating the APP, and Beacon itself cannot collect any data.

Developers need to communicate with consumers not only about the capabilities of the device, but also the functionality of the app, including interactivity, security factors in place, and how consumers should perform security controls to effectively eliminate common fears about device security. And misunderstanding. For example, Bluetooth pairing is not only a way to establish a device connection, but also a strong security measure in the hands of users.

Error 3: Ignore consumer access

If consumers have simple, full access to device security settings, they will feel that they have control and they will have more confidence in the security of device interaction. Providing users to switch control of each APP's location-based services gives them direct control, allowing users to control the functionality of the APP. When designing the next generation of smart products, developers should pay more attention to giving users control over devices and apps. How do developers give users more control over Bluetooth smart devices in device interactions, or give them more access to wireless connection switches?

Bluetooth already includes features that give pairing control back to the consumer. A new feature in the latest Bluetooth 4.2 specification makes it difficult for eavesdroppers to track devices via Bluetooth connectivity. This feature allows the MAC address in the broadcast packet to be automatically updated at regular intervals (time intervals set by the manufacturer) to ensure that the device and its users cannot be tracked by the broadcast address.

Error 4: Functional and security difficulties

When creating a smart device, there is always a trade-off between security and user experience. Developers and product manufacturers must continue to make trade-offs based on customer needs and specific features. This requires a careful review and trade-off between absolute security and transmitted data. This depends to a large extent on the type of product being created and its function. For example, the safety requirements of the pedometer and the smart lock are different. The consumer purchases the pedometer is used to monitor the number of steps. Since the personal information has no correlation with the step data, the broadcast of the step data does not need to be excessive. protection. For smart locks, however, security is critical to their functionality. In many cases, the functionality of the device may be limited due to the exclusion of all types of connections due to additional security. In any application scenario, developers must carefully evaluate the security requirements of the devices they create and how the security implementation can affect the interaction of device features.

Error 5: Going back to security itself

Safety must not be taken lightly and must be carefully considered from start to finish. Developers must look at how consumers interact with devices and how security enforcement can impact device capabilities and user experience. Start with all possible security solutions, envision possible problems with the product or service, and learn from the successes and failures of other developers' security implementations to understand all possible security implementations.

The developer's world is already an open source environment, with a solution like Bluetooth Developer Studio (click on the link to download the Beta version http://developer.bluetooth.cn/libs/Cn/Community/News/2015/0415/182.html) Tools and resources that developers can share and learn from each other in the community, make innovation faster and better, and eliminate consumer concerns about security and privacy. When considering product safety options, you need to weigh the many factors to make the right choice for the consumer. Otherwise, it is not only the trust of consumers, but also the good impression of consumers on the brand and the intention to buy again.

Mr. He Genfei worked with more than 27,000 member companies to advance the smart home, wearable, health and medical, sports and fitness, industrial, and other consumer electronics industries. He is committed to promoting advanced Bluetooth technology, enabling more developers, manufacturers, and consumers to create endless possibilities with wireless technology.

Multifunctional Operating Device For Alps Automobile

Push-Operated Switch,Multi-Function Switch Used By The Camera,Operation Switch For Health Products,Multifunctional Operating Device For Alps Automobile

DA CHENG MINGHUA LIMITED , https://www.alpsswitch.com