SHARE
Facebook X Pinterest WhatsApp

GSMA Releases IoT Security Guidelines

thumbnail
GSMA Releases IoT Security Guidelines

IoT model -- GSMA IoT security guidelines

GSMA has released IoT security guidelines, but will IoT providers follow them?

Written By
thumbnail
Chris Raphael
Chris Raphael
Feb 12, 2016

GSMA, an association of mobile operators and related companies working together to support the GSM phone system, has issued new IoT security guidelines.

The guidelines are designed to promote secure development and deployment of IoT services and provide advice on how to handle cyber threats and data security issues.

In their announcement, the GSMA said the guidelines were developed with the help of academics, analysts, and other industry experts to ensure they are as comprehensive and inclusive as possible.

The guidelines have separate reports for service ecosystems, endpoint ecosystems, and network providers. As one example, the GSMA team looked at vehicle sensor networks for connected cars. According to the guidelines, while “systems like these are often well-engineered and take a large amount of effort to attack the ecosystem, subtle flaws in the communications architecture can lead to a compromised environment. In walled gardens, such as some CANbus networks, a single flawed endpoint can cause the entire system to become vulnerable. This, in safety-critical environments, is unacceptable.”

The guidelines also include recommended privacy considerations for IoT providers, who should start by asking themselves what kind of data is needed from the customer for the IoT device to function properly, according to the guidelines.

“As billions of devices become connected to the Internet of Things, offering innovative and interconnected new services, the possibility of potential vulnerabilities increases,” Alex Sinclair, chief technology officer of GSMA, told EGov Innovation. “These can be overcome if the end-to-end security of an IoT service is carefully considered by the service provider when designing their service and an appropriate mitigating technology is deployed.”

The GSMA project has the support of industry players including Verizon, China Telecomm, Orange, AT&T, Ericsson and Etisalat.

RTInsights Take: As we previously covered, IoT device security and privacy remains abysmal. That’s because for many IoT companies, security tends to be an afterthought. Even when alerted to problems, some IoT companies are slow to fix issues—such as thermostat maker Trane, which took two years to fix security flaws in its smart thermostats. GSMA and groups such as The Cloud Security Alliance have released guidelines—but a big question is whether the industry will follow them.

A related issue is privacy. Even for IoT devices that are secure, that doesn’t mean an IoT provider won’t use a customer’s personal data to commercial advantage. See: What’s scary about a set-top box? Privacy.


Want more? Check out our most-read content:

White Paper: How to ‘Future-Proof’ a Streaming Analytics Platform
Research from Gartner: Real-Time Analytics with the Internet of Things
E-Book: How to Move to a Fast Data Architecture
The Value of Bringing Analytics to the Edge
What’s Your Business Intelligence System? How About Your Culture
Video: Rocana Rolls Out 1TB of Free IT Monitoring

Liked this article? Share it with your colleagues!

thumbnail
Chris Raphael

Chris Raphael (full bio) covers fast data technologies and business use cases for real-time analytics. Follow him on Twitter at raphaelc44.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.