The Internet of Things is an imperfect system. The technology may have ballooned to billions of devices worldwide, but that does not mean connections are efficient or secure.
In fact, most IoT products on the market use cloud hosting to relay commands to and from the device, leaving responses vulnerable to sluggish latency and third-party security concerns.
Market research suggests that for every one second load time increases, customer satisfaction drops by 16%. This is concerning since communication latency in many cloud-based IoT products stretches to more than five seconds.
This is what Denmark’s Nabto combats with a communication infrastructure to allow real-time direct, encrypted communication between end-user clients (like tablets, smartphones, PC) and resource-limited devices.
The company’s secret sauce is peer-to-peer connection, which means clients interact directly with devices. The Nabto services running in the cloud act like a telephone switchboard – mediating direct, end-to-end encrypted connections. Once established, these services are out of the loop as opposed to “traditional” cloud data scenarios where central services are involved in all interaction between clients and devices.
Tech from the company out of Aarhus, Denmark, has been adopted for use with a range of devices, including surveillance cameras, alarm systems, building controls, solar-inverters and wind turbines.
Founder Carsten Rhod Gregersen said users and companies alike should be actively thinking about where their data is going – something which drives his company to provide a better alternative.
“Internet of Things devices have the ability to capture many data points about users and it is this fact which makes their hackability all the more worrying. Further, the varying data rights of global citizens means that IoT eyes are everywhere with little legal oversight,” he said.
“Many devices use cloud connection to relay commands. All the data is thereby kept at this third-party server, making it susceptible to outside forces. Installing a peer-to-peer connection removes this danger by establishing direct communication between device and receiver without the need for a middleman.”
Carsten believes every electronic device will eventually be connected, and it is integral that the connection type foregrounds security and performance.