In order to understand the need to physically secure connected objects, all you have to do is ask yourself a question. Would you leave your cell phone unattended on the street? The answer seems obvious, yet in the IoT world, this is not always the case. Connected objects must, therefore, be protected against the risk of theft, sabotage or compromise by a malicious third party.
Let's be clear, it is not for its own value that a connected object must be protected, but for the data it can contain and for the malicious use that could be made of it by using it to reach other targets. Depending on the situation, when a connected object must be left "in hostile terrain", it will be necessary to ensure that it does not contain any usable data and that it cannot be used by unauthorised third parties.