Operator interest in the seemingly arcane world of technology protocols often is tied to their future potential to save money by supporting the convergence of computers, networks and equipment.
Two of the key machine-to-machine (M2M) protocols that form the underpinnings of the Internet of Things are replete with vulnerabilities, design flaws and implementation issues that can leave ...