27
When selecting sensors, choose those that support standard connection protocols
compatible with your solution ecosystem. That said, Gupta sees the technology moving
in a direction that will make sensor selection easier. Rather than hard-coding a control
solution just to talk to a chosen set of sensors, sensors will come with downloadable
drivers. In the same way you can plug any printer into a computer and it will work right
away, he sees plug-and-play sensors on the horizon.
Security is another important consideration. "We cannot talk IoT without talking security.
It's no longer a separate world. It's no longer a separate sentence," Gupta says. IoT
security involves the incorporation of components such as a Trusted Platform Module
(TPM) to ensure secure startup. It also requires the use of authentication and encryption
in communications as well as evaluating supply chain security. It may even include
physical device design, such as tamper-proof boxes that render a device inoperable when
opened. Gupta says, "Every manufacturer has to generate a complete study of possible
security pitfalls, from supply chain to end-user integration. For each layer, there must be
security constructs to mitigate those risks. Perform the risk analysis, and then mitigate
the threats accordingly."
"We cannot
talk IoT without
talking security.
It's no longer a
separate world.
It's no longer
a separate
sentence."