Home / Internet of Things (IoT) / How to Gain Trust from IoT Consumers Through Security System

How to Gain Trust from IoT Consumers Through Security System


In the year full of connected cars, homes, devices, and smartphones, we need to realise that everything is going to be easier. As we are connected to every single devices around us, managing them would not be hard because we are provided with many useful devices.

The explosion of digital era makes us addicted to everything that is easy. The penetration of the technology itself doesn’t need huge effort. Internet of Things basically can be managed through you smartphone. Which is own by more than half people in the world.

Beside makes living easier, there are some flaws that make Internet of Things fragile. The security of Internet of Things is still tricky and some users are aware that their data might be exposed in public or even stolen.

Gartner said in a May Analysis Cyber Security and privacy concerns are the main obstacles in the IoT adoption. A January Report by The US Federal Trade Commission enumerated the risks of a standard-less IoT: enabling unauthorised access and use of personal information, facilitating attacks on other system, and endangering personal safety.

IoT vendors need to realise that their consumers want privacy, security, and they need to know that their data is secured in the right hand. They won’t like having their connected car being driven by another person or their smart home being hijacked by intruders. These are main reason why IoT is glorious yet fragile.

The IoT Vendors should include some IoT security system in their framework such as:

1. Tested Security

It’s one thing to adopt a set of security controls like the Payment Card Industry Data Security Standard, designed to reduce credit card fraud. It’s another thing for those controls to prevail in a sophisticated penetration test. The IoT would need to set the bar at this higher level to earn maximum user trust.

2. Data Minimization
IoT components should maintain default settings that use the minimum amount of personal data to perform their service. Minimum can mean minimum types of data fields collected and exposed to other devices as well as minimum periods of data retention.
3. Controlled and transparent disclosure.
 Law enforcement and national defence around the world will seek to pursue their legitimate objectives within the IoT. Virtually every industry will seek to track or analyse their end consumers as they move through the system. Trust in the whole enterprise will collapse, however, if these pursuits are not counterbalanced with reliable disclosure controls that are proportionate to the identified threat, and widely known and understood.
4. Data portability.
 Users won’t want any one node of the IoT ecosystem to accumulate too much power by storing data in its own proprietary format. To bolster trust in the entire system, adopt a common data format that allows users to port their data from one platform to the next.
5. Right to be forgotten.
 The IoT should be safe for the most vulnerable in society: children, victims of crime and the poor. To protect their safety and thereby make the IoT the largest possible marketplace, enable users to completely opt out by being able to withdraw their data.
IoT Security might be the last thought for consumers since they have been fond of what IoT did into their lives. IoT vendors could just ignore it, but of course we don’t want our car hijacked by someone else.
source: computerworld.

About Girly Saputri

Girly is a Content Marketing at Eyro Digital Teknologi, Ltd. She is also a copy writer and likes cheeseburger. She writes about iBeacon and its implementation. You can find her on LinkedIn as GirlySaputri.

Check Also


Internet of Things Trends in Mobile Banking

Banking is somewhat taking part of our lives. It is getting more convenient and easy ...

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>