- Internet of Things Tutorial
- Internet of Things - Home
- Internet of Things - Overview
- Internet of Things - Hardware
- Internet of Things - Software
- IoT - Technology & Protocols
- Internet of Things - Common Uses
- Media, Marketing, & Advertising
- IoT - Environmental Monitoring
- IoT - Manufacturing Applications
- IoT - Energy Applications
- IoT - Healthcare Applications
- IoT - Building/Housing Applications
- IoT - Transportation Applications
- IoT - Education Applications
- IoT - Government Applications
- IoT - Law Enforcement Applications
- IoT - Consumer Applications
- IoT - Thingworx
- IoT - CISCO Virtualized Packet Zone
- IoT - Salesforce
- IoT - GE Predix
- IoT - Eclipse
- IoT - Contiki
- IoT - Security
- IoT - Identity Protection
- IoT - Liability
- Internet of Things Useful Resources
- Internet of Things - Quick Guide
- Internet of Things - Resources
- Internet of Things - Discussion
Internet of Things - Security
Every connected device creates opportunities for attackers. These vulnerabilities are broad, even for a single small device. The risks posed include data transfer, device access, malfunctioning devices, and always-on/always-connected devices.
The main challenges in security remain the security limitations associated with producing lowcost devices, and the growing number of devices which creates more opportunities for attacks.
The definition of a secured device spans from the most simple measures to sophisticated designs. Security should be thought of as a spectrum of vulnerability which changes over time as threats evolve.
Security must be assessed based on user needs and implementation. Users must recognize the impact of security measures because poorly designed security creates more problems than it solves.
Example − A German report revealed hackers compromised the security system of a steel mill. They disrupted the control systems, which prevented a blast furnace from being shut down properly, resulting in massive damage. Therefore, users must understand the impact of an attack before deciding on appropriate protection.
Beyond costs and the ubiquity of devices, other security issues plague IoT −
Unpredictable Behavior − The sheer volume of deployed devices and their long list of enabling technologies means their behavior in the field can be unpredictable. A specific system may be well designed and within administration control, but there are no guarantees about how it will interact with others.
Device Similarity − IoT devices are fairly uniform. They utilize the same connection technology and components. If one system or device suffers from a vulnerability, many more have the same issue.
Problematic Deployment − One of the main goals of IoT remains to place advanced networks and analytics where they previously could not go. Unfortunately, this creates the problem of physically securing the devices in these strange or easily accessed places.
Long Device Life and Expired Support − One of the benefits of IoT devices is longevity, however, that long life also means they may outlive their device support. Compare this to traditional systems which typically have support and upgrades long after many have stopped using them. Orphaned devices and abandonware lack the same security hardening of other systems due to the evolution of technology over time.
No Upgrade Support − Many IoT devices, like many mobile and small devices, are not designed to allow upgrades or any modifications. Others offer inconvenient upgrades, which many owners ignore, or fail to notice.
Poor or No Transparency − Many IoT devices fail to provide transparency with regard to their functionality. Users cannot observe or access their processes, and are left to assume how devices behave. They have no control over unwanted functions or data collection; furthermore, when a manufacturer updates the device, it may bring more unwanted functions.
No Alerts − Another goal of IoT remains to provide its incredible functionality without being obtrusive. This introduces the problem of user awareness. Users do not monitor the devices or know when something goes wrong. Security breaches can persist over long periods without detection.
Kickstart Your Career
Get certified by completing the courseGet Started