1588 Security & Timing
The growth of the IoT is a very exciting thing, Jeff, but it also heightens the need for proper security and network timing. Connecting more devices mushrooms the entry points for hackers. In theory, a hacker only needs an IP address to enter a network. When we consider an entire business being run through many clouds, with multiple IP addresses, the need for proper security becomes clear. Encryption strategies, such as IEEE 802.1AE MACsec, that offer efficient, scalable and affordable security will be vital. Layering into this idea is the issue of timing. Nanosecond-accurate timing is crucial for these networks, and will need to work hand-in-hand with security encryption. We will no doubt see that for the growth of IoT to continue, 'secure 1588' technologies will be pivotal to operators' long-term plans.