[Tech]Existing IoT Market Pain Points Part 2

ReapChain(REAP)
ReapChain Official
Published in
2 min readOct 19, 2020

--

Problems Caused by Hacking IoT Devices and Accessing Unauthorized Devices

Devices connected to IoT must be connected to the network with individual ID.

Currently, in the IoT industry, various things come to provide information. However, there is no reliable ID authentication and data verification system for individual things.

The IoT environment has a structural characteristic that various devices are connected to each other. Therefore, it is difficult to use the encrypted algorithm of the existing system, making it vulnerable to attacks such as Malware and DDos.

Various attacks on IoT devices occur frequently. Hacked devices are highly likely to be used as a means to spread malicious codes and spam, by leaking important data such as user account information and passwords. Since the forged data of hacked devices cannot be verified and secured, various side effects such as malfunction of the entire system due to incorrect data transmission may occur.

If authentication of IoT devices or data security system is not established, threats across IT services may occur.

★ ReapChain Official Community

Follow the ReapChain official community and have more news!

Homepage: https://reapchain.com/
Telegram (ENG): https://t.me/ReapchainOfficialEnglish
Telegram (KR): https://t.me/joinchat/MbaQ7RaZchMzjAam9yMS0Q
Blog: https://blog.naver.com/reapchain
Facebook: https://www.facebook.com/ReapChain/
Twitter: https://twitter.com/ReapChain
Bitcointalk: https://bitcointalk.org/index.php?topic=5260297.0

Partnership and Affiliation Inquiries: reapchain@reapchain.com
Investment and Sale Inquiries: sale@reapchain.com
Project Inquiries: reapchain.official@reapchain.com

--

--