Right-sizing M2M security: The best protection is security tailored to your application

Olivier Beaujard

(Blog) — As the volume of M2M devices and data increases, so do the associated security risks. The question, says Olivier Beaujard (pictured), is what should enterprises using machine-to-machine communications (M2M) and OEMs developing M2M solutions be doing now to protect their applications and secure the data centre?

The obvious answer may seem to be ‘everything they can’, but in practice the goal for an M2M application should not be to provide the ‘most’ security. It should be to provide the right level of security for that specific device and application. This is because the above question is more complicated than it may seem.

The phrase ‘M2M application’ encompasses a full ecosystem that extends beyond the device itself, including the cellular network, M2M cloud management platform and back-end enterprise application, all of which have unique security considerations. Even on the M2M device itself, security is not straightforward. Most M2M devices don’t have a full operating system or enough processing power to support or run advanced security software.

Is the answer then to build every M2M device with a full operating system? No, the smartest M2M security is that which is tailored for the specific application.

To do this, one needs to understand three essential truths about security:

  • Ensuring the right level of security is always necessary: No enterprise would deploy a system that afforded free reign for attackers, and no legitimate M2M vendor in the marketplace today would build one
  • No system can ever be 100% secure: Security must align with the expected lifetime of the solution. It should be secure enough for the threats faced today, but upgradable to defend against future threats
  • Security always means constraints: The more security a system employs, the higher the costs to build and operate it, the more usability will suffer and the more restricted it will be in the features it can support. Ultimately, too much security can be just as problematic as too little.

 

A secure M2M application must protect the transmission of private and confidential data. This involves data encryption and secure transmission technologies across multiple segments of the M2M application – between deployed devices, the M2M cloud management platform and the enterprise application. Moreover, securing M2M apps requires robust authentication and fault tolerance mechanisms that provide effective protection against malware and ensure resilience of the M2M ecosystem.

Finally, to maintain security in a constantly evolving environment, enterprises and OEMs must be able to update M2M devices and applications quickly and remotely, across thousands or millions of deployed devices.

Today the risk is relatively low, as M2M has not reached the kind of critical mass that attracts significant attention from hackers. That being said, M2M is very quickly growing, and given the widening scope of information being collected through M2M systems, ensuring it is properly secured is a key consideration in any implementation project. Any enterprise or OEM can achieve the ‘right’ level of security for its M2M application, both today and for the future. The key is to work with vendors that understand not just security, but have deep expertise and extensive field experience in M2M itself.

The blog’s author is Olivier Beaujard, vice-president of Market Development at Sierra Wireless.

 

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more