IoT and security—Digging deeper

In some ways, the Internet of Things is aptly named, especially when it comes to security. There are a lot of things to worry about.

IoT risk management point categories include the source, transport, network infrastructure, data connections, host systems, and recipients. Within each point are hundreds, possibly thousands, of components—each of which offers hackers a potential opening to infiltrate the infrastructure.

A 360-degree approach

Implementing IoT security can seem overwhelming; so much so that many companies simply assume their service providers have it covered. That puts tremendous pressure on your operations, especially if a breach occurs. The secret to successful IoT security is to take a 360-degree approach to your operations, following three basic tenets—prevention, detection, and response, says Carmi Brandis of Aeris.

Prevention: Involves network ‘whitelisting’ and traffic segregation. Whitelisting is accomplished by controlling both device and systems access. Traffic segregation prevents unauthorised mobile-to-mobile communications from taking place, a vital security measure in our increasingly untethered world. The recent Jeep incident, caused by a weakness in peer-to-peer communications, could have been prevented had the vehicle infrastructure incorporated security levels of device access based on traffic segregation.

Numerous IoT risk management points

Detection: With IoT is a lot more complicated than with the cloud or web solutions. For example, a hacker can turn a device into a ‘sleeper cell’ right at the manufacturing level, before it ever goes online. IoT detection includes both anomaly and timely elements. Anomaly detection recognises compromised devices through data transmission patterns.

Even a sleeper cell would be immediately exposed once activated. Timely detection requires early and/or instantaneous (as with the sleeper cell) detection. Many hacks can remain hidden for years, as evidenced by the LinkedIn and Yahoo breaches. In Yahoo’s case, the undetected attack dramatically lowered the company’s sales price.

Response: Is a two-prong approach, immediate and measured. If a breach occurs, the system blocks the affected devices on the fly, thus minimising the impact on other applications. Measured response makes your devices proactive by requiring verification for all over-the-air updates. Only authorised updates are allowed for security fixes.

No IoT system will ever be foolproof, unfortunately, but by approaching security from a comprehensive ‘every view’ standpoint, you greatly increase your chances of winning every battle.

Contact us to find out how Aeris can heighten the security for your deployment.

The author of this blog is Carmi Brandis of Aeris

Comment on this article below or via Twitter: @IoTNow OR @jcIoTnow

FEATURED IoT STORIES

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, iot home automation is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more
RECENT ARTICLES

Silicon Labs brings AI and Machine Learning to the edge with matter-ready platform

Posted on: January 24, 2022

AUSTIN, TX. 24 January 2022 – Silicon Labs, a specialist in secure, intelligent wireless technology for a more connected world, announced the BG24 and MG24 families of 2.4 GHz wireless SoCs for Bluetooth and Multiple-protocol operations, respectively, and a new software toolkit. This new co-optimised hardware and software platform will help bring AI/ML applications and

Read more

The chaos of legacy equipment

Posted on: January 24, 2022

Legacy equipment is vital to the functioning of many manufacturing facilities. Nevertheless, with rapid advancement in automated and connected technologies, managing both new and old equipment simultaneously can be a challenging balancing act. Here Johan Jonzon, CMO and co-founder specialist in edge analytics for the industrial Internet of Things (IIoT), Crosser, shares insight into how

Read more