Preventing IoT Hacking – Takeaways from 3 IoT Security White Papers | IoT For All

Real security is on all fronts. Here’s 3 new approaches for protocol, radio, and physical security.

IOTA’s developers ultimately plan to use MAM to allow people to ‘bid’ on data from devices connected to the tangle; automating the buying and selling of device data”

Bastille is a “mesh network of radio frequency (RF) sensors that can be deployed in an area to detect emissions between 100 kHz and 6 GHz”

PFP will “
automatically detect compromised, counterfeit, or unauthorized emissions.. by establishing a baseline power usage for a device and then coupling that baseline with machine learning models”