By Ritu Sharma on Feb 28, 2019
Sharing is caring!
The very essence of connectivity across devices and sensors in IOT makes it prone to security vulnerabilities. The increasing trend to add layers of intelligence by augmenting edge data through endpoints and sensors augments the privacy and data confidentiality risks.
Key security concerns
The Internet of Hackable Things is considered a deeply intensive study that looked at the various issues plaguing IOT security. The problem is especially pronounced in smart homes and buildings and in connected healthcare infrastructures.
Some of the interesting insights that came out of the study are –
1 – 9 out of 10 devices on an average collected some form of information through the device
2 – 8 out of 10 devices and cloud components didn’t come with a strong password
3 – 7 out of 10 devices had poor security set up, which enabled a hacker to employ enumeration and identify valid user account details.
In addition to these worrying stats, the study found that 70% of devices used unencrypted network services.
The study pointed out to dangerous vulnerabilities in smart equipment like CT scanners and Implantable Cardioverter Defibrillators (ICDs). Even with smart homes, there have been cases where parents were shocked to discover that intruders hacked into connected baby monitors to speak to their children.
Potential reasons for security risks
1 – Pressure to perform
Shortening time to market and increased pressure to cater to a fast-growing sector means that security is often an overlooked aspect. This is similar to the early days of Android or iPhone app development where security used to take a backseat till KRAs like user engagement or user base started dropping.
2 – Disparate players in the ecosystem
The problem becomes magnified when there are third-party touchpoints that are needed to build and deploy an impactful IOT ecosystem. The range of device OEMs that add connectivity, sensors, and data transmission protocols to a host of devices ranging from CT scanner to smart TVs (all of which are in turn, manufactured by different companies). So unlike, Android or Windows, there is no single company like Google and Microsoft that can adopt and implement high-performance security standards into the entire ecosystem.
3 – Security Maturity
Some of the key IOT devices that a 2015 Capgemini study found most vulnerable to cybersecurity threats include
1 – Wearables – 50% of respondents rate it high on resilience to cyber attacks
2 – Smart Metering – 50%
3 – Industrial Manufacturing – 47%
4 – Automotive – 35%
5 – Home automation – 18%
This clearly shows that respondents don’t believe that the existing security implementation is adequate. A mature security framework is needed to bring down this worrying figure.
4 – Large landscape to be protected
IOT, in general, tends to bring a large number of disparate systems into play. This leads to multiple points of vulnerability. These include IoT product, the software, and data being transmitted or stored. It also includes data centers where analytics happen and endpoint devices. Securing all these systems together under a common IOT security protocol might be challenging.
Recommended redressal mechanisms
1 – Secure boot
This IOT security solution uses cryptographic code signing mechanism. This makes certain that a device only executes by scripts generated by the authentic OEM device. This step prevents an unauthorized breach and attempts to replace OEM firmware with malicious versions.
2 – Authentication
Every step in the data transmission or connection of IOT device to the sensor or network needs to be authenticated before sending or receiving data. With edge devices especially vulnerable to hacks, this step can go a long way in protecting the overall IOT set up. Popular techniques involve Secure Hash Algorithm (SHA-x) or Elliptic Curve Digital Signature Algorithm (ECDSA). Using data encryption, this IOT security measure can be further strengthened.
3 – Lifecycle management
Smart lifecycle management ensures real-time security for connected devices when the data is in transmission between sensors, edges, and networks. Even in case of downtime, OTA device key replacement can ensure business connectivity. Further, if a device is depleted or sensors are scrapped, then device decommissioning protocols must be applied swiftly to prevent threats of exploits.
To sign off – An emphasis on security as a culture rather than an instance
A key missing piece in enhancing IOT security is the security culture. This culture is nearly non-existent in current IOT configurations. An integration of human behavior and data and algorithms can help build a profitable security culture. This way, security is not considered as an after-thought but becomes a vital factor in every stage of the IOT architecture design, development, deployment, monitoring, and analytics.
You may also like
The occurrence of the catastrophic incident in life such as a sudden job loss, medical emergency, and accident can give you sleepless nights and...Read More
Exhibitions are one of the best places for you to see the different types of exhibition stands that people and companies use to display...Read More
Nowadays, SEO or Search Engine Optimisation is a key marketing strategy for businesses for all sizes. It is something without which a business can’t...Read More
You can have an enticing website loaded with the latest features, offering a remarkable experience to the users. However, until and unless, your potential...Read More
When we are done fixing and decorating the other rooms that we have in our houses, it is now...
If you are operational in the telecom industry, you may need the facilities of an RF engineer for your...
There are three things you should know about your electric bill to save money. If you’re like me, you...
Despite the fact that Google keeps refreshes its highlights however keyword research is as yet one of the significant...
An unfortunate truth in modern time is that many people have bad credit score but they are in need...
American airlines one of the major airlines and its headquartered located in Fort Worth, Texas. It is also known...
The idea of a fitness or eating plan can seem all too cliche and for some people, this type...
Nowadays, SEO or Search Engine Optimisation is a key marketing strategy for businesses for all sizes. It is something...
Buying a house is not an easy task, we all know why. If you are a first-time buyer with...
Technological advancements are now widely visible; hence, the transport system has witnessed a marvellous breakthrough. For this very reason,...
You can have an enticing website loaded with the latest features, offering a remarkable experience to the users. However,...
Buying a house is not as easy as it seems. Before you start your hunt for a house, you...