Does cellular act as a ‘natural barrier’ to IoT hacks?

In this blog we continue our focus on security by switching gears from ‘premises’ security to securing the data that continually streams from connected devices in the Internet-of-Things, says Alex Brisbourne, CEO of KORE. 

In fact, security (along with privacy – more on that in a future post) probably stands out as the most active point of discussion when it comes to building out an effective Internet-of-Things. Concerns are well-founded because, candidly, there’s a lot at stake.

Alex Brisbourne
Alex Brisbourne

Much of this has to do with the impression that the IoT means hundreds of thousands more physical devices in a given enterprise will be connected to the Internet, with every single one of those devices representing a potential point of vulnerability. As an imaginative exercise, think of what could happen if, once driverless cars have become a bona fide component of everyday life, the connections to those cars were to land in the hands of a nefarious party. Highway mayhem could become an ultimate act of cyber-crime, with cars suddenly acting willy-nilly at the hands of a perpetrator.

The security issue is so pervasive that the “once King of mobile” Blackberry has designs on becoming a “once and future King’ around providing non-phone device security. The matter is spurring innovation in areas where one could not be blamed to think innovation had run its course.

That being said, it may be instructive to first look into how the Internet of Things diverges from the “regular” Internet as we know it. Terming it an ‘Internet’ as actually a bit of misnomer, because it largely consists of wireless-connected devices or sensors interacting in a client-server, or hub-and-spoke model; the Internet analogy does not, and should not, apply for most real-world applications coming online today. The level of interconnectivity among devices is fairly low, given the dedicated point-to-point communication, and point-to-point service delivery.

Which is to say, the IoT environment is much more closed in the first place than the literature would have us believe. There are architectural differences that go beyond how humans communicate over the Internet.

Moreover, IoT devices generally aren’t wired down to a network jack. Rather, they’re mostly connected over the air via cellular and fixed wireless technologies. There is an important distinction to make here. As compared to fixed network resources such as WiFi, which are built primarily on a single set of protocols, cellular networks are varied — not only in underlying technology but also in the frequency used. Cellular contains a certain obscurity that works to its advantage.

In addition, 3G cellular networks for example have five different sets of security features built into the architecture:

  • Network Access Security, which provides identity confidentiality, user authentication, confidentiality, integrity and mobile equipment authentication.
  • Network Domain Security, which allows the provider domain to securely exchange signaling data, and prevent attacks on the wired network.
  • User Domain Security, which lets a device securely connect to mobile stations.
  • Application Security, which lets applications in the user domain and the provider domain securely exchange messages.
  • Visibility and Configurability Security, where users can freely find out which security features are available.

On top of these built-in mechanisms, data streams running over cellular are often subject to more stringent security processes such encryption or SSL support, depending on the application. And sensitive markets such as energy or payment processing implement even more specific security overlays that go far beyond simple protection against end-point ingress, such as PCI and NIST. We’ve mentioned these before.

Taken together, it is my contention that as far as security is concerned, the use of cellular as the primary connector for IoT devices, even when fixed wireless technologies could be employed, offers a more significant set challenges to would-be IoT hacks wreaking havoc inside of device domains. It is not my aim to represent that cellular networks are completely secure by the simple virtue of their being cellular. They are of course open to attacks such as DOS, channel jamming, message forgery, and the like.

There is, however, something to be said for the up-front level of access layering that cellular networks naturally throw into the equation. The idea that these connections have the capacity to impede access at the outset, like border fences in a prison until reinforcement can be called, adds a tangible, if not vital, source of value.

The author is Alex Brisbourne, CEO of KORE

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more