The program calls for working prototypes that can act as the basis for shifting security off IoT devices themselves, which is a broad goal of vendors who are concerned about IoT security. They recognize that these devices are generally inexpensive, which means they don’t have a lot of headroom for adding security.
It also means the type of functions they perform and data they transfer is limited and predictable, making it more likely that patterns can be identified that indicate a normal baseline. Deviations from the baseline could warrant investigation, and the more specifically monitors can label activity, the greater the accuracy of the security analysis.
Sign up for CIO Asia eNewsletters.