Security Issues in the Advancing IoT

From the moment Kevin Ashton coined Internet of Things term, and started talking about advanced connectivity and machine to machine communication, peoples’ reactions went from idealized picture of smart cities to apocalyptic scenes from Terminator 2: Judgment Day movie. Truth is that people still don’t realize the real dangers that are lurking behind Internet of Things concept. In this article we will discuss Internet of Things’ security and potential issues that might come up, when this concept becomes fully operational in real life.

Advancing IoT

Awakening Jeep and Tesla hacks

It was a lovely sunny day in St. Louis. Andy Greenberg drove his Jeep Cherokee on the freeway, when SUV’s computer went mad. First it messed in-seat climate control system and made Andy chill, then it changed music from easy hip hop beats to maximum-volume Skee-lo and in the end the engine completely stop running, and the pictures of Charlie Miller and Chris Valaseck showed up on computer’s display.

After this stunt, Miller and Valaseck immediately received competitive job offers from Tesla. But even their advanced hacking and internet security skills weren’t able to protect Tesla’s Model S from Kevin Mahhafey’s and Marc Rodgers’ hack, which used insecure four years old Apple WebKit to shut down electric roadster’s engine.  These two car hacks made some of the worst IoT enthusiasts’ dreams come true. They showed that in Internet of Things environment skillful hackers can access various devices and make them run in irregular way. This means that hacker can for example connect to company’s printers, start them all at once and make them print ‘War and Peace’ novels, therefore destroying company’s printing budget. One way out of this issue is to refill your HP toner and forget it ever happened. But traffic, medical equipment and military installations hacks can be 1,000 times more hazardous and even the slightest possibility of hacking some of these gadgets sounds terrifying.

Some of the most common IoT security issues

Internet of Things undoubtedly increases attack surface. Experts are still trying to find effective and scalable solutions that will help them to make IoT more secure, but these are some of the burning issues they are still facing today:

  • Current IP is too small for IoT– IPv4’s block space is limited and it is already depleted by American Registry of Internet Numbers. IoT concept involves trillions of new IP addresses, with each one being assigned to every new gadget that connects to the network. Some experts like Francis daCosta claim that this huge number of new IoT devices won’t be individually managed. New devices will only be accommodated by the new IPv6 protocol. This will lead to creation of many new self-organizing local networks. These small networks will enable administrators to have a closer look on devices’ security.
  • Future OS wars– Today most devices like Apple watches, sleep monitors and smart locks connect directly to smartphones and desktop computers and use their OS to run their chores and deliver data. In the future when every gadget will be capable of connecting to the network independently, they will all require their own Operational Systems. This will create a huge stir in already messy OS market, and it will be really hard to mash up data from hundred (maybe even thousand) different operational systems.
  • Hardware problemsEdith Ramirez, chairwoman of US Federal Trade Commission, is one of the first experts who realized that production of low-cost and low-quality sensor devices increases vulnerability of the whole IoT concept. Most IoT chips that are sold today are based on outdated architecture (like Quark processors). This means they are much easier to breach. That’s why IoT concept still requires standardization, when it comes to both hardware and software, which will drastically increase its security.

IoT devices require complex security

Devices that make IoT concept running require complex security that will cover all possible threats and scenarios and have multilayer approach. Question of IoT device security needs to be addressed throughout devices lifecycle and it should cover all of its phases, from initial design to real time operational environment. Devices should contain all of these security mechanisms and protocols:

  • Secure booting– from the moment device is turned on, it should go through system verification, using cryptographic digital signatures;
  • Access control– if some part of IoT device is compromised, access control should stop the intruder from obtaining more data from the network;
  • Device authentication– each device should authenticate itself prior to obtaining network access;
  • Firewalls– IoT devices require firewalls that will control incoming and outgoing information;
  • Regular patches– devices’ OS should be patched on a regular basis;

Internet of things is still in first phases of its development. It is very important to say that development of internet itself went through these phases in a very similar way. Two decades ago there were many concerns about network security, and many experts were very doubtful of its use in official communication, banking and sales fields. These concerns grew after the appearance of malware, DDoS attacks and phishing. Despite all these concerns and security risks internet now makes the world moving and represents indispensable tool in all spheres of human life. Hopefully one day, Internet of Things will reach the same status.

Games Security
Best Web Designing Tools
Best Web Designing Tools You Can’t Live Without
Email Marketing Software
How to Choose Your Email Marketing Software for Your Business?
Live Chat
4 Reasons Why Live Chat is the Ideal Solution for Customer Support
External Giveaway Freebie TechnoGiants Giveaway
Focusky Pro
Giveaway #41: Focusky Pro 3-months Plan Subscription
MacXDVD
Freebie: MacXDVD Gives Away 10K Free Copies of MacX Video Converter
Flipbook
Giveaway #40: FlipHTML5 Flipbook 3-months Platinum Plan Subscription
Android iPhone
App Builder
7 Excellent Mobile App Builders for Personal and Professional Apps
Android Device
How to Keep Your Data Safe and Secure On Your Android Device?
Android Phones
Exciting Features of Android Phones you Probably Didn’t Know
Adsense
Guest Posting
6 Tips to Maximise Your SEO Efforts with Guest Posting
On-Page SEO
5 Ways Content Editors can kill your On-page SEO
On Page Optimization
Understand the effectiveness and important of On Page Optimization
MAC Software
Best VPN Service
How to Choose the Best VPN Service for Torrenting?
Technology Integration
5 Ways Technology Integration Will Help You Get More Business
Accessories
5 Must Have Portable Accessories in 2017
Blogging Social Media
Blog
5 Effective Ways To Save Time While Writing Blog Posts
Facebook Marketing
6 Tips for Using Video Marketing on Facebook
Time Management
8 Time Management Strategies for Fellow Bloggers
Content Writing
Infographic: 7 Reasons Why Content Is Still King in 2017
Email Marketing
Infographic: The Giant Email Marketing Statistics Guide
Ecommerce
Infographic: How to Create Your Ecommerce Store With Magento
Ways to Backup iPhone
Infographic: Ways to Backup iPhone – Avoid iPhone Data Loss