Security Solutions to Expand Smart IoT Markets

  • ID: 4083403
  • Report
  • Region: Global
  • 210 Pages
  • Smart Insights
1 of 5

FEATURED COMPANIES

  • Able Device
  • AT&T
  • Eurosmart
  • GSMA
  • NXP Semiconductors
  • Prpl Foundation
  • MORE

The report “Security solutions to expand smart IoT markets” analyzes the Internet of Things (IoT) security business opportunity. Service providers rely on IoT solutions to reach new efficiencies and performance optimization along with the introduction of new big data analytics. Although the potential benefits are undeniable, today most IoT systems lack adapted security architectures to face the risks of a connected world. IoT complexity demands the implementation of security solutions from end-to-end of the value chain.

The report focuses on secure IoT opportunities in six market segments (smart home, consumer devices, automotive, smart cities, industrial IoT and healthcare). It analyzes major trends and challenges, the IoT security architecture and security solutions available, the value chain as well as the positioning and business models of the multiple stakeholders in this industry. Standardization, interoperability, regulation and privacy issues, among others, are also discussed.

The report forecasts secure IoT device shipments and their installed base in six market segments between 2017 and 2022. In each market segment, shipments are also calculated according to the type of security solution adopted (i.e. software, hybrid or hardware.) Moreover, product and services revenues are also computed for each segment during the forecast period.

This report covers the market landscape and its growth prospects over the coming years (2017-2022). “Security solutions to expand smart IoT markets” forecasts secure IoT device shipments and their installed base in six market segments. In each market segment, shipments are also calculated according to the type of security solution adopted (i.e. software, hybrid or hardware.) Moreover, product and services revenues are also computed for each segment over the forecast period.

READ MORE
Note: Product cover images may vary from those shown
2 of 5

FEATURED COMPANIES

  • Able Device
  • AT&T
  • Eurosmart
  • GSMA
  • NXP Semiconductors
  • Prpl Foundation
  • MORE

1. Introduction

2. IoT definition

3. IoT devices’ functions

4. IoT components
4.1. The IoT devices or “things”
4.2. Networks or communication infrastructure
4.3. Platforms or computing infrastructure

5. IoT segmentation
5.1. Smart home
5.2. Consumer devices
5.3. Automotive
5.4. Smart cities
5.5. Industrial IoT
5.6. Healthcare

6. Trends and drivers

7. Challenges

8. Connectivity
8.1. LPWA networks
8.1.1. LoRaWAN
8.1.2. NB-IoT
8.1.3. LTE-M
8.1.4. EC-GSM-IoT
8.2. 5G

9. Value chain

10. Stakeholders
10.1. Customers
10.2. Developers and software vendors
10.3. Hardware manufacturers
10.4. IoT solution provider
10.5. IoT system integrator
10.6. Connectivity providers
10.7. Platform providers
10.8. Security solution providers
10.9. Service providers
10.10. Standardization and regulation bodies

11. Why we need IoT security
11.1. Security attacks
11.2. Security architecture
11.2.1. Security risk assessment
11.2.2. Securing devices
11.2.2.1. Software Solutions
11.2.2.2. Hybrid solutions
11.2.2.3. Hardware Solutions
11.2.2.4. Authentication
11.2.3. Securing data
11.2.3.1. Roots of trust
11.2.3.2. Signing code
11.2.4. Mitigation strategies
11.2.5. API Management
11.2.6. IoT security best practices

12. What to do with IoT data?
12.1. Value-added services
12.2. Securing data

13. Privacy
13.1. Data protection rule in the EU
13.2. Data protection rule in the US

14. Business model

15. Standardization and interoperability

16. Certification

17. Regulation
17.1. European Union

18. Market trends and forecasts
18.1. Smart home
18.1.1. Shipments
18.1.2. Revenues
18.1.2.1. Security products revenues
18.1.2.2. Security services revenues
18.1.2.3. Total security revenues
18.2. Consumer devices
18.2.1. Shipments
18.2.2. Revenues
18.2.2.1. Security products revenues
18.2.2.2. Security services revenues
18.2.2.3. Total security revenues
18.3. Automotive
18.3.1. Shipments
18.3.2. Revenues
18.3.2.1. Security products revenues
18.3.2.2. Security services revenues
18.3.2.3. Total security revenues
18.4. Smart cities
18.4.1. Shipments
18.4.2. Revenues
18.4.2.1. Security products revenues
18.4.2.2. Security services revenues
18.4.2.3. Total security revenues
18.5. Industrial IoT
18.5.1. Shipments
18.5.2. Revenues
18.5.2.1. Security products revenues
18.5.2.2. Security services revenues
18.5.2.3. Total security revenues
18.6. Healthcare
18.6.1. Shipments
18.6.2. Revenues
18.6.2.1. Security products revenues
18.6.2.2. Security services revenues
18.6.2.3. Total security revenues
18.7. Total
18.7.1. Shipments
18.7.2. Installed base
18.7.3. Revenues
18.7.3.1. Security products revenues
18.7.3.2. Security services revenues
18.7.3.3. Total IoT security revenues

19. Final remarks

20. Companies and organizations
20.1. Able Device
20.2. Actility
20.3. AIOTI
20.4. Amazon
20.5. Apple
20.6. AT&T
20.7. Broadband Internet Technical Advisory Group (BITAG)
20.8. Cisco
20.9. CNRFID
20.10. ECSO
20.11. ETSI
20.12. Eurosmart
20.13. Gemalto
20.14. Giesecke & Devrient
20.15. GlobalPlatform
20.16. Google
20.17. GSMA
20.18. Industrial Internet Consortium
20.19. Internet of Things Security Foundation
20.20. Infineon
20.21. Inside Secure
20.22. Intel
20.23. LoRa Alliance
20.24. NXP Semiconductors
20.25. Oberthur Technologies
20.26. oneM2M
20.27. Oracle
20.28. Praetorian
20.29. Prpl Foundation
20.30. Safran
20.31. Sigfox
20.32. Sierra Wireless
20.33. ST Microelectronics
20.34. Trusted Objects
20.35. Wisekey

21. Glossary

22. Methodology

Note: Product cover images may vary from those shown
3 of 5

Loading
LOADING...

4 of 5

FEATURED COMPANIES

  • Able Device
  • AT&T
  • Eurosmart
  • GSMA
  • NXP Semiconductors
  • Prpl Foundation
  • MORE

The concept of Internet of Things (IoT) is relatively new, but the IoT itself has been growing for more than a decade now. Over the years, the number of monitoring and control devices has been growing significantly. With the addition of connectivity, these devices can now collect and transmit data in real-time that can be analyzed to extract valuable information. Combined with machine learning and behavioral analysis, IoT can derive meaning from data to deliver end-users seamless experiences and help organizations to reach new efficiencies.

IoT can be embedded into almost every imaginable type of device: automobiles, home appliances, manufacturing stations, medical devices, x-ray machines, etc. The IoT market can be segmented into six segments: smart home, consumer devices, automotive, smart cities, industrial IoT and healthcare. In each of these market segments, IoT solutions target both consumers and businesses.

Although the potential economic benefits of the IoT may be massive, they are by no means guaranteed. Recent security breaches, whether on devices, on the cloud or on the network, have put the spotlight on the need for improving IoT and connected devices security before reaching mass adoption.

Until now, IoT growth has been mainly driven by unsecure devices to which we added connectivity. These devices are then connected to traditional networks and integrated in organizations infrastructures. In fact, these unsecure devices have created new back doors for cybercriminals to sneak in, putting networks at risk.

Security concerns are driven by the vast amounts and types of data that are being collected by IoT devices, which potentially represent a far greater risk to users. This data, in the wrong hands, could be used for nefarious purposes. IoT security includes concerns about theft, privacy, safety and productivity (in the case of business customers).

IoT solution providers must understand the limitations of providing unsecure IoT and adopt the most convenient security architectures for their use case. Not all IoT devices and systems have the same security requirements; thus they do not need the same security solutions. To better understand their systems’ necessities, IoT solution providers must perform a risk assessment to determine what are the best security architecture / solutions to adopt.

Independently of the security level needed, IoT security must be incorporated along the entire value chain (end-to-end security) since the solution’s design (security by design). A major issue is the fact that many legacy devices are unable to support security, and new devices do not have security built in by design. Securing IoT depends on a secure device, network and ecosystem incorporating trusted service management, data management and compliance with regulation.

The author anticipates diverse security implementations (from pure software to independent hardware) will be deployed in the next years. Segmenting IoT security solutions into software (i.e. pure software solution), hybrid (i.e. software and hardware based solution) and hardware (i.e. hardware solution), forecasts suggest security adoption in the IoT market between 2017 and 2022.

Forecasts include IoT device shipments and their installed base in six market segments. In each market segment, shipments are also calculated according to the type of security solution adopted (i.e. software, hybrid or hardware.) Moreover, product and services revenues are also computed for each segment over the forecast period.
                                           
By 2022, there will be 27 billion connected devices around the world. Device shipments are expected to grow at a CAGR (Compound Annual Growth Rate) of 19% during the forecast period. IoT security solution providers have an opportunity to collect EUR 21.5 billion in revenues by 2022. These revenues correspond to both sales of security solutions and the security management services jointly delivered.

Given the complexity of IoT, security solution providers are expected to embrace a role similar to a trusted service manager (TSM) in the near field communication (NFC) ecosystem. They will be security managers acting as a neutral broker that sets up business agreements and technical connections with connectivity providers, OEMs or other service providers controlling the security architecture of the system. The IoT security manager enables service providers to distribute and manage their IoT applications remotely by allowing secure (over the air) access to devices. The need for value-added services related to IoT security management will bring the largest business opportunities for IoT security providers.

Despite IoT fast expansion and organizations efforts, IoT market still lacks standardization. Currently, every player is trying to develop “the secure solution” that will become the next de facto standard. This creates issues of integration of multiple solutions. Interoperability among devices is expected to be a major driver for IoT adoption and benefits.

Nevertheless, there is no “one solution fits all” for IoT security. Different technologies will emerge in the first stage of IoT de­ployment, but as the market matures and standardization and regulation evolve (especially for highly regulated markets), the market will enter a harmonization phase.

Note: Product cover images may vary from those shown
5 of 5
  • AIOTI
  • AT&T
  • Able Device
  • Actility
  • Amazon
  • Apple
  • Broadband Internet Technical Advisory Group (BITAG)
  • CNRFID
  • Cisco
  • ECSO
  • ETSI
  • Eurosmart
  • GSMA
  • Gemalto
  • Giesecke & Devrient
  • GlobalPlatform
  • Google
  • Industrial Internet Consortium
  • Infineon
  • Inside Secure
  • Intel
  • Internet of Things Security Foundation
  • LoRa Alliance
  • NXP Semiconductors
  • Oberthur Technologies
  • oneM2M
  • Oracle
  • Praetorian
  • Prpl Foundation
  • ST Microelectronics
  • Safran
  • Sierra Wireless
  • Sigfox
  • Trusted Objects
  • Wisekey
Note: Product cover images may vary from those shown
6 of 5
Note: Product cover images may vary from those shown
Adroll
adroll