• About
  • Advertise
  • Contact
Tuesday, October 28, 2025
No Result
View All Result
NEWSLETTER
iotphoenix
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
No Result
View All Result
iotphoenix
No Result
View All Result
Home Internet of Things

Chime: A lifeguard for vulnerable IoT devices

in Internet of Things
0 0
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter

Smart appliances are supposed to be the next big thing. Analysts predict that it’s a multi-billion dollar market. Why aren’t we there yet? Security. It’s a challenge for both manufacturers and users.

Once connected to the internet, IoT devices can do amazing things, but they also become vulnerable to hackers. There are two main reasons for this:

  1. Limited resources: Low-cost IoT toolkits simplify the task of developing new smart devices. The downside of these devices is that they’re often too underpowered to run security software or communicate securely.
  2. Lack of standards: Connected devices vary greatly in their security safeguards by manufacturer. If one device is hacked, it potentially compromises other devices on the same network.
IoT security concerns

Cloud-enabled security

Chimefrom Innovation Labs by AVG (the antivirus and online security company) protects smart appliances by ensuring network traffic is authorized only to approved websites and mobile apps. Chime is installed on Wi-Fi routers and uses an online directory to stay current with new malware and hacking threats. It applies security techniques originally developed for enterprise security to also protect connected devices:

1. Two-factor authentication: Is that really you?
Chime creates a secure connection between the device and the owner’s authorized phone, tablet or computer. A hacker with stolen username and passwords is blocked from accessing the connected device unless the person also has physical access to a pre-authorized phone or PC by thistwo-factor authentication.

2. Blacklists and whitelists: In or out?
Chime develops a whitelistwith normal network behavior for each connected devices and a list of approved websites for updates. There’s also a blacklist of known viruses and IoT malware sites to block.

3. Heartbeat protocol: Are you still alive?
Users depend on their connected devices to alert them if something is wrong. What happens when a hacker intentionally disables an appliance and turns off sensor readings? Chime protects against this form of attack by checking the heartbeat of the device to make sure it’s still alive and working as planned.

Network security for smart home deviceshttp://www.SkilledAnalysts.com

“Many customers are unaware of the security threats when they install a smart appliance,” said Shaul Levi, who leads Innovation Labs. “We designed Chime to protect any smart appliance that communicates by Wi-Fi. It runs on the Wi-Fi router that’s already in the home and is continuously updated from an online database that includes AVG security updates and IoT services from partners.”

Unknown unknowns

“There are known knowns. There are things we know that we know. There are known unknowns. That is to say, there are things that we now know we don’t know. But there are also unknown unknowns. There are things we do not know we don’t know,” saidDonald Rumsfeld, the former U.S. Secretary of State, back in 2002.

He wasn’t talking about the IoT security, but hackers are definitely “unknown unknowns.” In such a situation, you’re safer with a lifeguard.

Resources:

This article is published as part of the IDG Contributor Network. Want to Join?

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Nulled WordPress Themes
Download Best WordPress Themes Free Download
Download Best WordPress Themes Free Download
Free Download WordPress Themes
online free course
download intex firmware
Download Best WordPress Themes Free Download
online free course
Tags: Chime: A lifeguard for vulnerable IoT devices
Next Post

Top 10 emerging technologies from the World Economic Forum

Recommended

Slideshow: Beyond passwords

New Microsoft BizTalk Server coming in Sept.

RFID boosts supply chain performance

Loading

Category

  • Analysis
  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Guest Opinions
  • Hardware
  • Infrastructure
  • Insider Insights
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • New Connections
  • News
  • Open Source
  • Opinion
  • Research
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2024 iotphoenix.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Technology Industry

© 2024 iotphoenix.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In