With the rapidly increasing number of IOT devices deployed
in the public especially in the context of a smart city, it is also becoming an
increasing security concern, given how more and more sensitive and personalised
data is being transmitted to and from servers. As a result, managing such
devices and monitoring them is becoming even more important than ever before. The
concept of IOT Device Management covers a few important aspects apart from
security which would be covered in the following paragraphs below.
Due to the nature of the changing landscape of the industry,
it is crucially important that IOT devices can be configured post-installation,
to appropriately adapt to the current use case that a certain device might be
used. For example, if a temperature sensor is being used in Singapore, configuration
such as choosing the default units should be possible.
Additionally, it is also crucial that devices with sensitive data can be wiped remotely
or be returned to factory default settings. This is to ensure that if a device
might be lost or even compromised, the data won’t be. it is also crucial to
have backup and restore functionalities so that if a configuration would to
fail, restoring a previous backup would be much easier than reconfiguring from
While IOT Devices usually work as intended and for extended
periods of time, it is also important that technicians and IOT developers implement
diagnostics and monitoring features into the devices remotely. This is to
ensure that any potential problems could be diagnosed early even before it
becomes an issue that would affect the service or the data collection process
in a significant manner. For example, if there is a memory leak from a rogue or
misbehaving program, developers could monitor increased memory usage from that
program remotely, diagnosing an issue before the memory leak seriously affects
performance in a significant manner.
As mentioned previously, Security is an important aspect in IOT
Device Management. Devices in the network of IOT devices needs to authenticate
and verified un-compromised by external parties in both software and hardware.
Developers needs to ensure that sensitive data is only transmitted if needed
and through secure channels.