One of the barriers to full m2m adoption is the issue of security. In this panel discussion we will explore a more practical side of m2m and security – mainly how to identify the threat vectors for specific m2m applications and then deliver the right solution in order to make it most economical. Our focus will be on discussing the need for security and the techniques that can or should be used, keeping in mind the cost vs. benefit of the security on typically resource-constrained M2M devices.
There is still little understanding of what an “end-to-end” security solution means and given that an m2m system is made up of components that include the devices, the network, the platforms and operating systems, as well as connections to the enterprise systems, it makes it that much more difficult to create that end-to-end solution. This quote recently is a good summary of this topic: “If the reaction to the new security threats is simplistically to add even stronger protection, then the cost of that additional security will result in M2M solutions that are not economically viable.”