How do we ensure the IoE/IoT devices are operated in their predefined working scope? And, how do we prevent and detect those devices from being hacked or hijacked to perform an illegal attack?------------------------------
YIU CHUNG CHEUNG
Huawei Technologies Co. Ltd
------------------------------