IoT products and systems can be physically compromised

Consider IoT products such as Roadside Units (RSUs), which are deployed alongside roadways. RSUs interface with connected vehicles and Traffic Management Centers (TMCs). These devices are deployed in physically unprotected locations. This means that a motivated attacker can capture these devices, and analyze them for vulnerabilities.

Finding a vulnerability in one of these devices can provide information that can be used to compromise and manipulate large groups of these devices—for example, if the same default password is used across an entire family of devices. 

Commercial IoT device manufacturers face an even bigger challenge. Their products are designed to be bought off the shelf. ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.