Security issues can not be ignored, how much do you know about the five major Internet of Things security risks?

Now, if you haven't heard of the Internet of Things (IoT), then you are really OUT. In the technology society that has not only given the Internet of Things a guess, but has risen to practice, people seem to be rushed by this novelty. I lost my mind and ignored the safety issue. A Bluetooth technology expert exposed the idealization of the Internet of Things and proposed a solution to the trouble, resulting in an IoT melee.

The current society is a fast-growing technology society. Every day, new smart products will be released. The benefits of connecting independent products to achieve integration are understandable, but the accompanying security and privacy issues are also worthy of attention. The SIG surveyed 26,000 member companies and found that there are five identical issues in the development of any new product and security policy.

1. Security performance leads to controversy

When a product is connected to a tool, security is compromised. Traditional security measures leave a bad impression on developers and users, and some outdated practices can't meet security requirements. For example, developers often believe that Bluetooth pairing is challenging for consumers. Since 2004, the huge changes in pairing technology and the update of pairing specifications have not only made the connection process between devices and devices easier. Many security features, such as encryption, trust, data integrity, and user privacy are also better protected. Based on user needs and adaptability to the device, Bluetooth offers several matching options for user-friendly, secure connections.

The latest version of Smart Bluetooth technology is built on the government level, compatible with FIPS security, using AES encryption, ECDH encryption and the latest low-cost secure connection. However, some applications do not require ECDH key generation or 128-bit AES encryption, and Bluetooth tools allow developers to design according to the degree of encryption they want.

2. Lack of method popularization

A common misconception is that beacons track people or users, and virtually any beacon is going to do just send a real-time signal. An application on a smart device can determine whether the access is successful by receiving a message when the user process accesses the user. When the user downloads and activates the application, a unique connection message with this information is sent. The beacon itself does not do any data collection.

Clear interaction principles and user-controlled methods of device safety can quickly eliminate their fear and misunderstanding of security. For example, the pairing of Bluetooth is not only a connection to establish a device, but also a mode for the user to control the security of the device autonomously.

3. Ignore user permissions

Give users an easy, clear right to manage the security of their devices and make them believe that the communication between devices and devices is secure. For example, the location information we sometimes use in our frequently used apps. What developers need to do is let the user decide which application can use location information and which one can't. When designing the next smart product, developers should focus on improving their rights management capabilities.

There is a new feature in version 4.2 that makes it difficult to track device information when it is connected to Bluetooth without permission. This feature causes the MAC address in the ad package to be replaced with a random value, which is determined by the manufacturer.

4. Functional and safety imbalance

In any case, the developer must evaluate the security requirements of the device, and in many cases, additional security features will exclude some types of connections, which will limit the functional integrity of the device. For example, the safety requirements of the pedometer and the smart lock are not the same. The consumer buys a pedometer to measure the number of steps. Since the personal identity information of the user will not be related too much, the data about the number of steps will not be It will be overprotected, but for smart locks, security is naturally more important than its function, which requires designers to improve the functionality of the device while focusing on security.

5. Security

Security cannot be considered as the last factor to be considered in the development process and must be included in the development plan from the outset, and must be considered at each subsequent step. In the beginning, it is best to consider all the security issues involved, think deeply about potential problems, learn from the experience of success or failure of yourself or others, and provide comprehensive security protection for your products.

Editor's Note:

Security is the hottest topic of today, especially in today's information dissemination. With the exposure of various monitoring scandals, from a country to a small individual, people pay more attention to the security of personal privacy. How to do it? Absolute protection of personal privacy is also a challenge for the future including hardware and software systems. We all want to enjoy life without being bothered by irrelevant information.

About Bare Wire


    Application: Suitable for manufacturing electric motors, windings of electrical equipment, automobile electrical rotors, installation and distribution equipment and other electrical fields.

  Bare Wire


Bare Copper Wire




Rectangular: Thickness(a): 0.90 ~ 5.60

           Width(b): 3.15 ~ 16.00




160 kg~180 kg ply-wood spool(250*500; 250*600)


Suitable for manufacturing electric motors, windings of electrical equipment, automobile electrical rotors, installation and distribution equipment and other electrical fields.

   Bare wire includes Copper Bar and Aluminium bar

Bare Wire

Bare Wire,Bare Copper Wire For Motor,Flexible Bare Copper Wire,Electrical Bare Copper Wire