Device to Cloud, Hands-On. Part 6: Why End-To-End Security Matters

Download this episode

Download Video

Download captions

Download Captions


In this 6th episode of my Device to Cloud series, which is another whiteboard talk, I'm talking about why application-level security matters in typical M2M scenarios where, for instance, sensors pick up environmental data and control systems react on that input and take action. 

Security approaches that merely focus on providing a secure tunnel separating "this" system from the rest of the world, or are even further segregating traffic at the lowest layers of the network, are not a sufficient solution if the underlying networks are not fully trustworthy (that includes public mobile operator networks) and/or there is any risk of 3rd party interception and manipulation inside such a segregated network zone, for instance by foreign malware intrusions and in the infamous Stuxnet case.

The best way to deal with network-level foul play is to pull the responsibility for privacy, integrity, and identity up to the application layer or to at least tie these concerns into the application layer from the underlying network layer.

[Part 1] [Part 2] [Part 3] [Part 4] [Part 5]



Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.