Telling the truth about SME life today

Device security must be priority in development of Internet of Things

Share on facebook
Share on twitter
Share on linkedin
Share on email

If you havent encountered the phrase before, the Internet of Things (IoT) refers to the expanding network of interconnected, internet-enabled devices. Driven by miniaturisation, the affordability of components such as cheap Bluetooth sensors, and the growing ubiquity of technologies such as WiFi, it is now possible to connect devices in a way that would never have previously been thought possible.

Our increasingly connected lives

To give you an idea of scale, this means that controllers for central heating, lighting, a variety of household appliances from the fridge to your home security system, your satellite TV box, desktop, laptop, mobile and tablet have the potential to be talking to each other, communicate to a variety of third parties and be controlled from a centralised device. This level of connectivity offers a plethora of opportunities to propel us to a more sustainable, energy efficient society as greater control, analysis and insight is presented to consumers and businesses.

Its an opportunity that some of the biggest names in technology have already jumped upon. Apple recently introduced Homekit, a platform that will co-ordinate various third-party home automation accessories, allowing you to unlock your doors or turn on and off your lights via your iPhone. Google, too, demonstrated its interest by paying 1.9bn earlier this year to buy Nest Labs. Already well known for its connected thermostats and smoke detectors, Nest is currently investigating a slew of other applications related to the home everything from health tracking to security systems.

A window of opportunity for criminals

This is great, in theory, but the more devices that become internet enabled and the higher the level of connectivity between those devices, the greater the opportunity is for hackers to cause damage and disruption. If we simply start connecting an increasing number of devices to the internet without truly considering security implications we could hand hackers the opportunity to cut our electricity, flood our homes and pry deeper into our private lives.

Indeed, we have already seen the first reported attack which exploited both smart household devices and conventional computers. Late last year more than 100,000 consumer devices, including an internet-connected refrigerator, smart TVs and multimedia hubs, were exploited to send more than 750,000 spam and phishing emails. 

The majority of the devices used in the attack were not infected by malware, but were simply left open so that attackers were able to use their IP capabilities to relay spam and infected emails. But this incident highlights just how resourceful attackers have become in using unconventional, but effective, attack vectors. 

Securing the IoT

Now that attacks against these smart devices have begun, they will only escalate and securing this explosion in device numbers will be critical. It goes without saying that, if the increased threat level posed by the Internet of Things, a wider spectrum of manufacturers are going to have to consider providing a product that both connects and is robustly secure.

But this will not be straight forward due to the limited processing capability and on board memory that many newly connected devices will have. This severely limits the scope for conventional security such as data encryption, leaving newly connected devices in the security dark ages. For instance, as things stand, security will rely upon users changing passwords and other settings away from defaults, and ensuring the devices are not left open in the same way that people are recommended to protect their home WiFi networks.

Given the increased stakes, relying on such primitive security is likely to be futile in the battle against cyber-crime. A new generation of security will be required to protect our connected lives and manufacturers will be tasked with adopting a new generation of protection embedded security.

Embedded security is the concept that of reducing the data footprint of more robust security technology, enabling them to be embedded into the appliance without any impact on processing speed. This would facilitate the installation of network-based firewalling, web filtering, application control and encryption capabilities within a very small storage and memory usage footprint, enabling secure networking for a wide variety of devices. The upshot of this would be a range of devices operating on distributed but secure environments.

This kind of advanced security technology will enable IT and communication equipment manufacturers to achieve competitive advantage, differentiation and higher margins for their products by embedding security into IP-enabled equipment such as routers, switches, access points, electricity meters, household appliances and vehicles in fact, into any device that connects to the Internet. Clavisters advanced solution is an excellent example as it enables vendors to utilize existing spare computing power in devices to apply comprehensive network security, using the minimum of extra processing power and capacity.

Be prepared – or prepare to fail

The possibility that devices in our homes will become increasingly connected and entangled may seem farfetched and the prospect of a criminal using nothing more than a computer to flood a home an idea from science fiction. As outlandish as the concept of the Internet of Things may sound it is inevitably going to come as is the increased threat from hackers. It is therefore critical that we integrate security early in the evolution of the process, to ensure maximum protection against interception, tampering and attacks. Failure to do so might just be catastrophic.

Jim Carlsson is CEO of Clavister.

Image source

Trending

Topic

Share on facebook
Share on twitter
Share on linkedin
Share on email

Related Stories

More From

Trending

If you enjoyed this article,
why not join our newsletter?

We promise only quality content, tailored to suit what our readers like to see!