IoT IoE Internet of Things Internet of Everything

Internet of Things, Internet of Everything the indication that the world is becoming increasingly more connected. All sorts of devices and appliances are getting an embedded or attached wired or wireless connection to the world wide network, allowing to receive sensor information and control the activities with an increased level of efficiency, effectiveness and automation. 

 


 

 

In this world of over 50 billion anticipated devices, of which the majority will be lit in Asia, Europe and the Americas, the challenge to secure both the activities and the privacy of the citizen are a challenge for consideration. 

LSEC is coordination various activities in this domain, including a working group, events and thought leadership. 

Some background materials : 

Internet of Things - 2015 the year all breaks loose event : 

1.

2. 

3. 

4. 

5. 

6. 

7. 

(To be able to access these files, you will need to be registered as an individual member to LSEC. This is free of charge, but requires registration or login.)

 

The Internet of Things describes the concept of a world with different devices connected via the internet. This provides a great opportunity, not so much for toasters and fridges to be hyperconnected for no good reason, but especially for sensors, process automation tools, connected cars, industrial processing devices, home automation and healthcare monitoring. 

The world of things is expected to grow significantly towards 2020, with challenges related to the number of devices connected, typically without the current state of the art of security measures. As a result, the devices are not only becoming rogue access points in networks, but are also behaving badly - sensing, recording and transmitting sensitive data - without the owners knowing about this. 
On top, many devices have been developed with low level low cost components and open source instructions which have not been updated recently to the latest vulnerability challenges, sometime not even capable of being upgraded. 

As a result, similar to mobile security challenges, threats can be expected from device level, the embedded chips, up to the application layers where typically small webservers can be reached remotely. 
These devices can be hacked in to relatively easily, can be used as familiar access point to the rest of the network, or could even serve as trusted device internally while acting as a sensitive data transmission device. 

LSEC and its members have been building in depth expertise on the topic, both on the embedded layers, the wireless and communication protocols, the programming layers, secure software development, the (management and operation) platforms, and the applications. 

More information can be found at some of the recent activities and events held, or following the iot.leadersinsecurity.org dedicated page. 

Related Experts

Related Documents

Partners

  • 2017-01-19_11-12-42.png
  • ACDCLogo_v4_Verde_150x79.png
  • agoria.png
  • APWGEU.png
  • arc_logo.png
  • b-hive.png
  • beltug.jpg
  • bronzecluster.jpg
  • centrodecyberseguridad.png
  • computable-logo-be-small.png
  • csc.png
  • dgconnect.jpg
  • dspvalley.jpg
  • fisc.png
  • heliview.png
  • infosecurity_belgium.png
  • isaca.png
  • jaarbeurs.png
  • logo-ecso.gif
  • nsmc.png
  • polescs.jpg
  • sirris.png
  • stopthinkconnect.png
  • teletrust-logo.gif
  • UKCSFlogo.png
  • VLAIO.png
  • voka.png

LSEC for Security Professionals

lsec-prof

LSEC for Security Companies

lsec-com

 

LSEC for enterprise & government

lsec-gov

 

LSEC for academia & research institutes

lsec-research

Request information about LSEC Membership

Click here

Sign up for our newsletter

Click here

Learn more about current projects & industry collaborations

Click here

Contact us

Click here

logo-acdcec

Privacy | Disclaimer | Responsible Disclosure Copyright LSEC - Leaders In Security 2002 - 2017 - Kasteelpark 10, 3001 Heverlee - Leuven | tel. +32.16.32.85.41