Menu

IoT FEATURE NEWS

Strong Security Will Underpin IoT Success

By

The Internet of Things is ushering in a Jetson-like future in which almost every device is capable of connecting to the Internet and is redefining the way humans interact with their immediate environments. At the same time, the transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security.

As people become increasingly reliant on intelligent, interconnected devices, how can IoT providers and technology and IT services firms protect potentially billions of these devices from intrusions and interference that could compromise personal privacy or threaten public safety?

Security is paramount for safe and reliable operations of IoT connected devices. Network firewalls and protocols can manage the high-level traffic resulting from the explosion of data, but what is the best way to protect deeply embedded endpoint devices, such as home security systems, thermostats, and refrigerators? By 2020, Gartner predicts, the IoT will be made up of 26 billion “things.” Fortunately, because IoT is in its infancy, there’s still time to secure devices before consumers are at risk. There’s not much in terms of security that can be added to a device as an afterthought. These heterogeneous devices come in sizes large and small, and when unmanaged, can easily (and unintentionally) spill their informational guts and provide unauthorized network access.

Because of the variety of devices and varying complexities of each one, there is no ‘one-size-fits-all’ approach. Manufacturers, working with IT services firms, need to ensure that each device is secure unto itself; it is no longer sufficient to deploy the device in a secure network. Security must be addressed throughout a device’s lifecycle, from initial design to operational environment. The initial steps in the process include secure booting to verify the authentication and integrity of a device, followed by secure communication. Most IoT devices don’t have the computing power to support full disk encryption, but sensitive data needs to be protected.

When the device is plugged into a network, it should authenticate itself; machine authentication should be required for all devices connected to the network. Devices also need embedded firewalls to control potentially harmful or malicious traffic that needs to be terminated. Devices in production must meet basic security standards, such as Data at Rest (DAR) protection, which is the encryption of sensitive data.

Efforts are constantly being made to create secure IoT ecosystems. This includes an end-to-end security management and analytics platform which serves several purposes, including to authenticate communication, protect applications, secure devices, and manage and update devices remotely, even in resource-limited environments.

Device makers, applications developers, and IT services firms must be vigilant in carving out secure systems within an internet that is public and vulnerable to an on-going number of intrusions. Security measures are constantly evolving to ward off threats, which will be vital to underpinning the short and long-term success of IoT efforts.

About the Author: Robert Hallahan is vice president, solutions architecture for Xavient Information Systems (www.xavient.com). He has more than 25 years’ experience consulting and designing advanced OSS/BSS solutions for Tier-1 US 3/4G Wireless, Cable MSO, and Direct Broadcast Satellite networks. Robert has worked with telecom firms to orchestrate the deployment of next generation service offerings. He can be reached at [email protected].




Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]


SHARE THIS ARTICLE
Related Articles

Spur Measurable IoT Growth through Viasat's ELEVATE Program - Registration for its ELEVATE Global Partner Event is Now Open!

By: Alex Passett    4/25/2024

Viasat's ELEVATE global partner event is right around the corner. From June 18-19 in Carlsbad, California, those interested in satIoT connectivity sol…

Read More

Assessing IoT Innovator LTIMindtree: Its 2023-24 Successes to Date and a Peek at What's Next

By: Alex Passett    4/24/2024

IoT Evolution World has presented a brief rundown of LTIMindtree's successes during FY24, as well as a peek at what's to come for the Internet of Thin…

Read More

Powering Adaptability in IoT: Telit Cinterion Reveals its First High-Precision GNSS Module

By: Alex Passett    4/22/2024

Telit Cinterion announced the launch of its SE868K5-RTK module, a high-precision Global Navigation Satellite System (GNSS) receiver capable of centime…

Read More

ICYMI: Your 'IoT TGIF' News Review

By: Alex Passett    4/19/2024

We've compiled several Internet of Things (IoT) stories that will benefit readers interested in global IoT market growth, Industrial Internet of Thing…

Read More

Tracking the Growth of IoT: Global Industry Revenue, Uses Cases, and Security for What's Next

By: Alex Passett    4/18/2024

Citing data from the likes of Stocklytics, Statista and Earthweb, further study of the rapidly evolving Internet of Things is always recommended.

Read More