Security and the Internet of Things - Take Two

By Carl Ford February 02, 2018

The first step is admission, so let me say it now: I was wrong!

I have been looking at the obstacles for adoption of IoT, and one of them has been security. If you are part of this industry you have heard the joke. “IoT; the S is for security”.  Candidly this joke upsets me – tremendously.

In the article about industrial controls I talked briefly about the computer worm Stuxnet. Kim Setter from Wired magazine covers it well with “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” .  While the system originally targeted Siemens Industrial Controls via Microsoft Windows computers specifically in Iran’s nuclear program, the ability to penetrate industrial controls was not known for at least five years. 

As Richard Soley of the Industrial Internet Consortiums conveys, there are two kinds of companies “those that know they have been hacked, and those that do not.” This is the real problem for IoT. It’s not a place where people work and live. Things only tell you they are in trouble if you design for it.  For more than 40 years we have not designed for systems to tell us everything including security.

Now with all this said, where is my error? The answer is in my projection where the solution can be found.

I believe the answer to managing a legacy problem can be solved by networking, and my thought process was that this would be done by IT. 

Candidly, I showed my age. Twenty years ago when I left the large organizations, IT was a strategic asset and had a lot of command and control.  One more aspect (victim?) of digital transformation is IT. In today’s market place, IT is an expense line, not an asset.

In the past month I have talked to third-party maintenance firms, staff augmentation companies (including Crossfire Consulting, my parent company), and of course cloud providers. Now in theory the chief information security officer can be the hope for a network security solution.

Ken Briodagh advocates that the problem needs to be solved in the hardware. Recently I spoke with Dipti Vanchani, vice president and general manager of the Internet of Things Group at Intel Corp. Intel and others have enabled identity in the silica with their Enhanced Privacy ID, eliminating a lot of opportunity for human error and deliberate malice. In effect security is becoming integrated in the operations.

The reason I wanted to solve this at the network layer is because operationally IoT is in lots of different areas within a corporation: buildings, manufacturing, retail, and supply chain.  

Edited by Ken Briodagh

Partner, Crossfire Media

Related Articles

The IoT Value Chain and What It Means for Telecom Service Providers

By: Special Guest    5/25/2018

Ericsson's recent research on the IoT forecasts that by 2026, there will be 20 billion IoT connections worldwide, up from 7 billion in 2017.

Read More

Technological IoT: Private Systems to Global Management Platforms

By: Special Guest    5/24/2018

Small closed IoT networks will be replaced by global scalable platforms capable of managing new generations of IoT sensors and devices.

Read More

Ayla Networks Adds Google Cloud Platform Support

By: Ken Briodagh    5/23/2018

Ayla's device connectivity and management expertise plus GCP's application enablement strength provide a powerful option for IoT product companies

Read More

Wind River Drives Open Source Edge Infrastructure

By: Ken Briodagh    5/23/2018

In a recent blog post, Intel and Wind River have announced their intent to make open source some of the components from the Wind River Titanium Cloud …

Read More

Itron to Provide Nationwide Smart Grid Solution for Jamaica

By: Ken Briodagh    5/22/2018

Jamaica Public Service to Continue Deployment of Itron's Gen 5 Network to Support up to 670,000 Electric Meters to Ensure Reliable Electricity Deliver…

Read More