Description |
1 online resource (ix, 202 pages) : color illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
|
text file |
|
PDF |
Note |
"Research report prepared on behalf of the U.S.-China Economic and Security Review Commission"--Cover |
|
"October 2018"--Cover |
Bibliography |
Includes bibliographical references. |
Contents |
Executive summary. China's approach to IoT development. China's race to set international standards. Unauthorized access to IoT devices and Chinese exploitation efforts. Authorized access to IoT data and privacy concerns. Conclusion. -- Introduction and methodology. -- Chapter 1: Overview of China's IoT development. China's IoT development strategy. Government support for IoT development. The current state of China's IoT development. Implications for the United States. Recommendations. -- Chapter 2: The standards race. Setting IoT standards. United States IoT standardization efforts. China's push to set IoT standards. Key points of contention. Implications for the United States. Recommendations. -- Chapter 3: Unauthorized access and Chinese research into IoT security vulnerabilities. Existing security vulnerabilities in the IoT: a primer. Chinese research into IoT security vulnerabilities. Implications for the United States. Recommendations. -- Chapter 4: Authorized access and privacy risks to U.S. citizens from Chinese data access. Chinese access to U.S. IoT data. Existing protections for U.S. data. Recommendations. -- Conclusions and areas for further research. -- Appendices. |
Summary |
This report examines how China's development of the IoT--bolstered by the Chinese government's efforts to harness national resources for its promotion--has put China in a position to credibly compete against the United States and other leaders in the emerging IoT industry. China's pursuit of IoT dominance constitutes a significant challenge to U.S. economic and national security interests. Its robust participation in international standards committees has given Beijing greater opportunities to dictate the rules of the road. Its research into IoT security vulnerabilities and its growing civil-military cooperation raise concerns about gaining unauthorized access to IoT devices and sensitive data. Its authorized access to the IoT data of U.S. consumers will only grow as Chinese IoT companies leverage their advantages in production and cost to gain market share in the United States. |
Note |
Online resource; title from PDF cover page (USCC, viewed November 1, 2018). |
Subject |
Internet of things -- Government policy -- China.
|
|
Technology and state -- China.
|
|
Internet of things -- Security measures -- China.
|
|
Internet of things -- Research -- China.
|
|
Internet of things -- Strategic aspects.
|
|
Technology and state. (OCoLC)fst01145265
|
|
China. (OCoLC)fst01206073
|
Added Author |
Walz, Emily, author.
|
|
Lafferty, Brian, author.
|
|
McReynolds, Joe, author.
|
|
Green, Kieran, author.
|
|
Ray, Jonathan, author.
|
|
Mulvenon, James C., 1970-
|
|
S.O.S. Int'l, publisher.
|
|
U.S.-China Economic and Security Review Commission, issuing body.
|
Gpo Item No. |
1089 (online) |
Sudoc No. |
Y 3.2:C 44/IN 8 |
|