Security in IoT

cloud surrounded by icons of various businesses and industries involed within the internet of things
IoT is transforming the way our society tracks and evaluates information while also transforming the way we protect information.

Since its first introduction 15 years ago, the Internet of Things (IoT) has now become one of the hottest topics within recent years as thousands of new IoT products are being launched into the market each year. Although the first IoT product was only a modified Coca Cola machine, IoT is now a part of our everyday lives. During Cloudbric’s visits to the Cloud Expo in London, quite a number of people have shown interests in discussing IoT security. Information security is often a neglected topic, but with IoT, it’s begun to turn heads.

Stories have been already published to show that security measures are needed for IoT products as IoT hacks are on the rise with smart car hacks, baby monitors hacks, children’s toys hacks, etc. running rampant. Technically speaking, however, not all IoT products need security. Children’s bracelets that only sense a child’s mood through body temperature do not need as much security measures compared to bracelets that track a child’s location. Security is often concerned only when data is evaluated as being valuable when compromised.

How Is Security Different for IoT Businesses?

Currently, there are three major types of security that businesses regularly use: physical, information and convergence. Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damages. Examples of physical security include CCTV surveillance, security guards, access control protocols, etc.

The second type of security is information security. Information security is a set of business processes that protects information regardless of how the information is formatted or whether it is being processed, in transit or stored. The most common methods of information security are: encryption, malware detection, and digital signatures.

The third and newest type of security is convergence security. Although the quickest growing, convergence security is a new security concept and its meaning is just what its name suggests—a convergence or combination of physical and information security. With convergence security, the security systems of a company are joined together with the company’s IT solutions—allowing the company’s physical security to play an integral role to IT and become the ultimate solution to IoT security.

Many people are mistaken that convergence security is difficult to develop; however, it is just the action of incorporating information security technology to existing industry systems. Convergence security is just the act of customizing physical and information security to an industry’s protocol—it does not require a whole new concept of security algorithms. For example, if a manufacturing factory is transitioning into a smart factory, where all the equipment is automated, security is needed to ensure that hackers do not interfere with manufacturing schedules and output. The factory can then work with an information security firm to make sure previous physical security measures are updated with the newly implemented information security scheme, thereby maintaining their existing security measures while updating protocols to meet industry convergence security standards.

Top Five Industries of IoT Security Development

The development of IoT can be categorized into five different industries. Just as industries vary with the type of data or functions that they process, their actual security regulations also vary. For example, the automotive industries security regulations are much stricter than those of consumer electronics (i.e: baby monitors, refrigerators, etc). Also, the extent of what security solutions have actually developed is based on the extent in which that industry has been developed. Because as the demand for the product or service skyrockets, so does the demand for its security. Because of these reasons, five industries have been identified as foci in the demand for IoT security development.

1. Automotive

Probably the most pressing IoT security issues is smart car technology. Duk Soo Kim, the CTO of Penta Security Systems, said that “Security technology has been used to protect the assets of businesses and people, while smart car security protects those people’s lives.” It is clear that hacking smart cars or transportation system/traffic information systems can directly lead to serious physical damage and/or casualties. The US Department of Transportation has already taken key steps toward requiring security technology to be installed in every smart car in the U.S by proposing regulations for standard Vehicle-to-Vehicle (V2V) technology. Smart car security solutions such as AutoCrypt, CycurLIB, ArgusIDPS and Aerolink are already available in the market.

2. Consumer Electronics

Consumer electronics are the most common of IoT products. From major tech conferences, such as CES and the Internet of Things World Forum to television commercials, you can see that IoT is quickly becoming a part of our common lives. Although we have seen a surge in consumer electronic hacks in the past couple of years, the focus of smart consumer electronics remains to be “connectivity,” with little focus on security development. For example, home appliance manufacturers call its new refrigerator as “family hub” since items are more connected, but home appliance companies often don’t highlight how the data being collected is protected. Much to our surprise, reports of refrigerators containing spam began circulating starting in 2014, awakening the dangers of what is called thingbot.

3. Smart Office

Smart offices, also known as smart buildings or smart businesses, are a rising trend in companies. With the rising concern that smart offices are an easy target to hackers, it is imperative to develop smart office security as hackers can affect a business’ productivity when they access a building’s communications system. Security for standard buildings have been incorporated in the the past; however, smart offices now involve managing and restricting access that include physical, remote, network, and device level factors.

4. Smart Factory

A smart factory is a factory with a fully integrated automation solution in its facility. In smart factories, industrial control systems (ICS), which are computer based systems, are installed to monitor and control industrial processes such as power, oil, gas pipelines, water distribution and wastewater collection systems.

The most used type of ICS is Supervisory Control And Data Acquisition (SCADA), which allows factory workers to simplify their operational duties by only needing to use electronic communications instead of local documents. Despite its convenience, SCADA is not completely secure as it was proven during the huge malware attack in June 2014 in the European SCADA systems. A malware called Stuxnet was uploaded to European SCADA control systems and sabotaged major confidential projects as well as industrial control system software.

5. Smart Grid

A Smart Grid is when Information and Communications Technology (ICT) is incorporated with the existing electric grids so that the information about producing and consuming electricity is exchanged in real time. According to the U.S. Congressional Research Service, attacks on the U.S. power grid are continuing to increase. As countries’ economies, governments and securities rely on electricity, there is a need to build strong convergence security around smart grids’ industrial control systems.

These five categories vary in terms of their services and information processed, but it is imperative any company that deals with people’s safety (both physical and digitally) must invest in security. For products that are integrated with IoT, physical or information security is no longer safe enough. As the demand for IoT products and services increase, these companies need to commit to creating convergence security systems that completely secure customers’ products and private information.

Comments
  • The article proved to be a great read, and I appreciate the detailed approach you provided. Your writing style is clear and concise writing style, and you made the topic accessible to comprehend. I particularly liked how you provided examples to support your arguments.

  • I was recommended this blog by my cousin. I am not sure whether this post is written by him as nobody else know such detailed about my problem. You are amazing! Thanks!

  • Hi, Neat post. There is an issue with your website in web explorer, might test this? IE nonetheless is the market leader and a huge component of other folks will pass over your great writing due to this problem.

  • One thing I’d prefer to comment on is that weightloss program fast may be possible by the proper diet and exercise. Your size not simply affects appearance, but also the quality of life. Self-esteem, depression, health risks, plus physical skills are damaged in excess weight. It is possible to just make everything right and at the same time having a gain. In such a circumstance, a condition may be the reason. While a lot of food rather than enough physical exercise are usually guilty, common health concerns and trusted prescriptions can easily greatly amplify size. Thx for your post in this article.

  • I’ve learned newer and more effective things by your site. One other thing I would like to say is that often newer computer operating systems have a tendency to allow additional memory for use, but they furthermore demand more memory space simply to operate. If someone’s computer cannot handle more memory as well as newest application requires that memory increase, it may be the time to buy a new Laptop or computer. Thanks

  • Thanks for the ideas you write about through this site. In addition, several young women that become pregnant will not even attempt to get health insurance coverage because they dread they won’t qualify. Although a lot of states today require that insurers give coverage irrespective of the pre-existing conditions. Charges on these kinds of guaranteed options are usually bigger, but when thinking about the high cost of medical care it may be a safer approach to take to protect your current financial future.

  • Hello my friend! I wish to say that this post is awesome, nice written and include almost all important infos. I?d like to look extra posts like this .

  • One thing is that if you find yourself searching for a student loan you may find that you’ll need a cosigner. There are many cases where this is true because you will find that you do not employ a past history of credit so the bank will require you have someone cosign the borrowed funds for you. Thanks for your post.

  • Can I just say what a relief to search out someone who truly is aware of what theyre speaking about on the internet. You undoubtedly know the right way to carry a problem to gentle and make it important. More individuals must read this and understand this facet of the story. I cant believe youre not more popular because you positively have the gift.

  • It is my belief that mesothelioma can be the most lethal cancer. It has unusual traits. The more I look at it the more I am confident it does not behave like a true solid tissue cancer. When mesothelioma is often a rogue viral infection, therefore there is the possibility of developing a vaccine plus offering vaccination to asbestos open people who are at high risk involving developing foreseeable future asbestos relevant malignancies. Thanks for giving your ideas on this important health issue.

  • You made some decent points there. I looked on the web for the problem and found most individuals will go along with together with your website.

  • Another thing I have really noticed is the fact for many people, a bad credit score is the results of circumstances further than their control. Such as they may happen to be saddled having an illness and because of this they have higher bills going to collections. It could be due to a occupation loss or the inability to do the job. Sometimes divorce can really send the financial circumstances in a downward direction. Many thanks for sharing your ideas on this weblog.

Comments are closed.