Sansa Security Reveals 2015 IoT Predictions

SANTA CLARA, CA -- (Marketwired) -- Dec 09, 2014 -- Sansa Security, a leading provider of embedded security technologies, today revealed the company's Internet of Things (IoT) predictions for 2015, highlighting six of the top trends to watch out for next year.

Top Six 2015 IoT Predictions:

1. The Rise of IoT 2.0: The biggest problem with IoT devices today is that most of them cannot interoperate with IoT devices from other manufacturers. This is due to an inherent weakness in the implementation of common security protocols. This weakness also means that multiple devices from different manufacturers cannot be operated through a single user interface on a computing device. In 2015, expect this obstacle to be corrected. If we don't see the first shipment of products that offer device interoperability and the ability to control devices through a single user interface by 2015, expect to read about product roadmaps from the major consumer electronics makers that promise to include these functions in future devices.

2. HomeKit and Thread Group Battle for Control of the Connected Home: In June, Apple introduced HomeKit, a software platform that enables developers to make IoT devices for the home that are controllable with an iPhone or iPad. In July, the Thread Group, a consortium of seven companies that includes Silicon Labs, Samsung Electronics, Nest Labs, ARM and Freescale Semiconductor, announced a new IP-based wireless networking protocol that aims to go after the same audience. However, neither platform will succeed without third-party compatibility. In the coming year, expect these two camps to furiously court developers into their ecosystems. Early rumblings suggest that Apple's HomeKit will be a closed ecosystem, akin to the company's App Store, while Thread Group will be more open, much like Google Play. No matter which protocol becomes the de facto standard, telcos and service providers such as Comcast and ATT, and alarm systems companies such as ADT, will have to make sure everything they deploy works with both.

3. Birth of the Home Mesh: In a mesh network, every node is able to share data with other nodes on the same network. When applied in a home setting, the technology will allow multiple devices to communicate to and through each other based on commands from another device, such as a tablet or smartphone. For example, if you are coming home from work, a proximity sensor in your phone will be able to recognize the lock on your front door as you approach it. As the lock is opened, the lock relays information to the thermostat to turn the heater on. The heater then tells the stove to begin pre-heating the oven and so on. Making the smartphone or tablet the hub of control for the modern home will eliminate point-to-point connections via the public Internet.

4. Death of the Password: The problem with passwords today is that they are not very secure. Cloud-based password-cracking tools available now can process as many as 300 million password attempts in about 20 minutes, which means that even strong encrypted passwords can ultimately be cracked, given enough time and resources. The demise of passwords is going to give rise to other forms of authentication, such as biometric authentication. An example of this is the fingerprint reader on today's newer iPhone models. Combining this form of authentication with a password or a gesture swipe is referred to as two-factor authentication and provides a more reliable and secure way to access and protect devices on the home network. Until two-factor authentication becomes the default setting on IoT devices, expect to continue reading stories about IoT devices getting hacked and their information leaked onto the Internet.

5. Major Corporations Enlisted to Help Curb Emissions: The problem with utility companies today is that they are not very efficient from a technological perspective. We expect that to change in 2015. Next year, we believe we will see the launch of the first smart-city IoT service aggregator, and it will be driven by one of the major IT consulting firms, such as IBM or Accenture. The new efficiencies created will enable all city services from power to water to traffic lights to be linked and run by an intelligent prediction system that leverages big data to constantly optimize the flow of power, water and signal timing. The aggregator will ultimately become the administrator of entire smart cities and eventually link together the power consumption of the planet, using big-data analytics and smart sensors to deliver power when and where it is needed. The new efficiencies created will reduce carbon emissions by up to 50 percent in an aggregator's first year of operation.

6. Drones Deliver Packages in Third World: This year Amazon floated the idea of using drones to deliver packages to a consumer's front door. While that idea may have looked good in theory, it is not likely going to happen in practice anytime soon -- at least not if the Federal Aviation Administration (FAA) has anything to say about it. Next year, the FAA is expected to start a process that will result in actual rules for drone usage over public airspace, but knowing how slow government bureaucracy is to move on important issues such as this, don't expect to see concrete rules published for at least another two years. Third-world countries, on the other hand, cannot afford that kind of lag time, especially when the cargo consists of badly needed medical supplies. Next year, expect to see drones shuttling numerous cargo types into hard-to-reach towns on the outskirts of such countries as Liberia, Guinea, Sierra Leone and Nigeria.

About Sansa Security
Sansa Security is the only comprehensive Internet of Things (IoT) security platform to be deployed across a quarter billion devices. The company offers unified, scalable security across both IoT and mobile devices and our products address all security aspects from the silicon chipset to the provisioning of secrets via the cloud. Sansa also enables new business models between customers, suppliers and technology partners by enabling secure interactions through a configurable trust model. As a privately owned company, Sansa serves the needs of the world's best-known semiconductor and device manufacturers and is consistently ranked among the leaders of the embedded security market. For more information, please visit www.sansasecurity.com or follow us on Twitter (@sansasecurity).

Media Contact:
Rick Popko
Trainer Communications

Email Contact
415-800-5362 





Review Article Be the first to review this article

EMA:

Featured Video
Editorial
Peggy AycinenaWhat Would Joe Do?
by Peggy Aycinena
Retail Therapy: Jump starting Black Friday
Peggy AycinenaIP Showcase
by Peggy Aycinena
REUSE 2016: Addressing the Four Freedoms
More Editorial  
Jobs
FAE FIELD APPLICATIONS SAN DIEGO for EDA Careers at San Diego, CA
AE-APPS SUPPORT/TMM for EDA Careers at San Jose-SOCAL-AZ, CA
Development Engineer-WEB SKILLS +++ for EDA Careers at North Valley, CA
ACCOUNT MANAGER MUNICH GERMANY EU for EDA Careers at MUNICH, Germany
Manager, Field Applications Engineering for Real Intent at Sunnyvale, CA
Upcoming Events
Zuken Innovation World 2017, April 24 - 26, 2017, Hilton Head Marriott Resort & Spa in Hilton Head Island, SC at Hilton Head Marriott Resort & Spa Hilton Head Island NC - Apr 24 - 26, 2017
CST Webinar Series



Internet Business Systems © 2016 Internet Business Systems, Inc.
595 Millich Dr., Suite 216, Campbell, CA 95008
+1 (408)-337-6870 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering TechJobsCafe - Technical Jobs and Resumes GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy Policy