What are your security considerations for monitoring Industrial IoT sensors?
We’ve started writing a series about security and IoT. The 1st article in this series is about which security protocols are implemented for uploading measurements from your sensor hubs to Tools.Valarm.net.
Whether you call this technology by the name of remote monitoring, M2M, Industry 4.0, telemetry, the Internet of Things, or any other buzzword, the bottom line is that you, your teams, and your organization will need to know how secure your monitoring systems truly are.
In this first IoT security paper we address security concerns dealing with the various security architectures and processes that are implemented in Valarm Tools Cloud. You should be aware of the the industry standards and how the sensor hubs in the field use communication technologies to upload sensor measurements to the Valarm Tools servers.
You’ll learn about key security architecture features we use for our Valarm Tools Cloud software, like:
- BSON ObjectIDs
- Cryptographically Signed API keys
- Device IDs
- IoT Sensor Data Spoofing
- HMAC-MD5 Signatures
Ready to learn more?
You can read more about IoT and security in the full article here.
Following this initial document, we’ll publish details about Industrial IoT Security once your sensor measurements are in the cloud.