Security Issues in the Advancing IoT

From the moment Kevin Ashton coined Internet of Things term, and started talking about advanced connectivity and machine to machine communication, peoples’ reactions went from idealized picture of smart cities to apocalyptic scenes from Terminator 2: Judgment Day movie. Truth is that people still don’t realize the real dangers that are lurking behind Internet of Things concept. In this article we will discuss Internet of Things’ security and potential issues that might come up, when this concept becomes fully operational in real life.

Advancing IoT

Awakening Jeep and Tesla hacks

It was a lovely sunny day in St. Louis. Andy Greenberg drove his Jeep Cherokee on the freeway, when SUV’s computer went mad. First it messed in-seat climate control system and made Andy chill, then it changed music from easy hip hop beats to maximum-volume Skee-lo and in the end the engine completely stop running, and the pictures of Charlie Miller and Chris Valaseck showed up on computer’s display.

After this stunt, Miller and Valaseck immediately received competitive job offers from Tesla. But even their advanced hacking and internet security skills weren’t able to protect Tesla’s Model S from Kevin Mahhafey’s and Marc Rodgers’ hack, which used insecure four years old Apple WebKit to shut down electric roadster’s engine.  These two car hacks made some of the worst IoT enthusiasts’ dreams come true. They showed that in Internet of Things environment skillful hackers can access various devices and make them run in irregular way. This means that hacker can for example connect to company’s printers, start them all at once and make them print ‘War and Peace’ novels, therefore destroying company’s printing budget. One way out of this issue is to refill your HP toner and forget it ever happened. But traffic, medical equipment and military installations hacks can be 1,000 times more hazardous and even the slightest possibility of hacking some of these gadgets sounds terrifying.

Some of the most common IoT security issues

Internet of Things undoubtedly increases attack surface. Experts are still trying to find effective and scalable solutions that will help them to make IoT more secure, but these are some of the burning issues they are still facing today:

  • Current IP is too small for IoT– IPv4’s block space is limited and it is already depleted by American Registry of Internet Numbers. IoT concept involves trillions of new IP addresses, with each one being assigned to every new gadget that connects to the network. Some experts like Francis daCosta claim that this huge number of new IoT devices won’t be individually managed. New devices will only be accommodated by the new IPv6 protocol. This will lead to creation of many new self-organizing local networks. These small networks will enable administrators to have a closer look on devices’ security.
  • Future OS wars– Today most devices like Apple watches, sleep monitors and smart locks connect directly to smartphones and desktop computers and use their OS to run their chores and deliver data. In the future when every gadget will be capable of connecting to the network independently, they will all require their own Operational Systems. This will create a huge stir in already messy OS market, and it will be really hard to mash up data from hundred (maybe even thousand) different operational systems.
  • Hardware problemsEdith Ramirez, chairwoman of US Federal Trade Commission, is one of the first experts who realized that production of low-cost and low-quality sensor devices increases vulnerability of the whole IoT concept. Most IoT chips that are sold today are based on outdated architecture (like Quark processors). This means they are much easier to breach. That’s why IoT concept still requires standardization, when it comes to both hardware and software, which will drastically increase its security.

IoT devices require complex security

Devices that make IoT concept running require complex security that will cover all possible threats and scenarios and have multilayer approach. Question of IoT device security needs to be addressed throughout devices lifecycle and it should cover all of its phases, from initial design to real time operational environment. Devices should contain all of these security mechanisms and protocols:

  • Secure booting– from the moment device is turned on, it should go through system verification, using cryptographic digital signatures;
  • Access control– if some part of IoT device is compromised, access control should stop the intruder from obtaining more data from the network;
  • Device authentication– each device should authenticate itself prior to obtaining network access;
  • Firewalls– IoT devices require firewalls that will control incoming and outgoing information;
  • Regular patches– devices’ OS should be patched on a regular basis;

Internet of things is still in first phases of its development. It is very important to say that development of internet itself went through these phases in a very similar way. Two decades ago there were many concerns about network security, and many experts were very doubtful of its use in official communication, banking and sales fields. These concerns grew after the appearance of malware, DDoS attacks and phishing. Despite all these concerns and security risks internet now makes the world moving and represents indispensable tool in all spheres of human life. Hopefully one day, Internet of Things will reach the same status.

Games Security
jQuery Plugins
Best Picks Of jQuery Plugins For Web Developers
How to Optimize your Plumbing Website to get more Calls?
Basics of Website Designing that every successful Web Designer known
External Giveaway Freebie TechnoGiants Giveaway
Focusky Pro
Giveaway #41: Focusky Pro 3-months Plan Subscription
Freebie: MacXDVD Gives Away 10K Free Copies of MacX Video Converter
Giveaway #40: FlipHTML5 Flipbook 3-months Platinum Plan Subscription
Android iPhone
Chat Apps
Best iOS Chat Apps 2018 – Our Top Rated List
Android Phone
Top Level Apps that Will make Your Android Phone Smarter
iPhone X
The Top 9 Apps Tailored to the iPhone X
SEO Professionals
Qualities of a Competent SEO Professionals — Who Should You Hire for Your Business?
Get the most out of SEO with the Least but the Effective Efforts
SEO Trends
4 Top and Best SEO Trends to Expect in 2018
MAC Software
E-commerce CMS Platform
10 Benefits of Using Magento as Your Preferred E-Commerce Platform
Technology Trends Expected to Be Major Players in 2018
HEIC Converter
Joyoshare HEIC Converter for Windows Review – The Most Powerful HEIC Converting Tool for iOS11
Blogging Social Media
How Blogging Is Crucial To Optimize Your Business Rankings
Social Media Marketing
Some Major Things to Keep in Mind While Planning on Social Media Marketing
Real Estate WordPress
Real Estate WordPress Themes: Some Of The Best Picks
Paid Ads
Infographic: Improvising Quality Score for your Paid Ads
Online Presence
Infographic: How to Maintain a Professional Online Presence as a Service Provider
Smart Cities
Infographic: 3 Reasons Behind the Need for Smart Cities
Customer Loyalty
Infographic: 6 Ways Social Media Can Help Build Customer Loyalty