1 online resource (ix, 202 pages) : color illustrations
text file
PDF
OCLC
on995470000002516738, on1060575537
"Research report prepared on behalf of the U.S.-China Economic and Security Review Commission"--Cover
"October 2018"--Cover
Includes bibliographical references.
Executive summary. China's approach to IoT development. China's race to set international standards. Unauthorized access to IoT devices and Chinese exploitation efforts. Authorized access to IoT data and privacy concerns. Conclusion. -- Introduction and methodology. -- Chapter 1: Overview of China's IoT development. China's IoT development strategy. Government support for IoT development. The current state of China's IoT development. Implications for the United States. Recommendations. -- Chapter 2: The standards race. Setting IoT standards. United States IoT standardization efforts. China's push to set IoT standards. Key points of contention. Implications for the United States. Recommendations. -- Chapter 3: Unauthorized access and Chinese research into IoT security vulnerabilities. Existing security vulnerabilities in the IoT: a primer. Chinese research into IoT security vulnerabilities. Implications for the United States. Recommendations. -- Chapter 4: Authorized access and privacy risks to U.S. citizens from Chinese data access. Chinese access to U.S. IoT data. Existing protections for U.S. data. Recommendations. -- Conclusions and areas for further research. -- Appendices