IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is smart devices, from refrigerators that warn you when you’re out of milk to industrial sensors, that are connected to the Internet so they can share data, but IoT is far from a simple challenge for IT departments.

For many companies, it represents a vast influx of new devices, many of which are difficult to secure and manage. It’s comparable to the advent of BYOD, except the new gizmos are potentially more difficult to secure, aren’t all running one of three or four basic operating systems, and there are already more of them.

A lot more, in fact, IDC Research says that there are around 13 billion connected devices in use worldwide already, and that that number could expand to 30 billion within the next three years.

Interoperability

The full benefits of the Internet of Things are only realised when large enough numbers of devices are able to interact with each other, and therein lies a big problem. The number of different players in the market covers a wide range, both horizontally, in terms of functionality, and vertically, among different industries.

With a huge number of companies “doing IoT,” most big-name tech companies, including Google, Microsoft, Apple, Cisco, Intel, and IBM have various types of IoT play, all working to bring as many users as possible into their respective ecosystems, motivation to make sure IoT systems and devices from different companies all work with each other is sometimes lacking.

The problem, of course, is that nobody’s willing to give up on the idea of their own ecosystem becoming a widely accepted standard, think of the benefits to the company whose system wins out! and so the biggest players in the space focus on their own systems and development of more open technologies lags behind.

Work is underway to improve testing and standardisation, including at Underwriters Laboratories, which has a "Living Lab" it uses to test smart home devices. The Internet Engineering Task Force, too, has seven different working groups tasked with creating IoT standards.

Systems

But, for the moment, there’s a vast array of technology out there that can accurately be described as enabling IoT. Just at the networking level, there’s Bluetooth, Bluetooth LE, ZigBee, RFID, Wi-Fi, cellular, Z-Wave, 6LowPAN, Thread, NFC, Sigfox, Neul, LoRaWAN, Alljoyn, IoTivity, Weave, Homekit, MQTT, CoAP, JSON-LD, and plenty more that can and do play a part in IoT implementations.

All of these are technical standards, and there are huge overlaps in their areas of functionality, which means that any given device might work with one, several or none of them. So interoperability can be a problem

Making this even more complicated is that some of these technologies address different layers of the stack, whether they’re basic radio communication tech, or a transport layer, or a data protocol, all the way up to something like Homekit that's almost an entire operating system in itself – and others are aimed at the same layer. Several even address various combinations of layers.

What this means is that different IoT implementations can use vastly different technologies, at every level, to get the job done. For example, Swedish pest control company Anticimex has its smart traps send text messages, via a carrier network, to an SMS hub that relays those messages back to a control center. This means that compromising a simpler system like a smart trap doesn’t offer a way into the company’s network, the way a more direct connection might.

In contrast, the team at Red Bull Racing needs constant, real-time data from its Formula 1 cars, which are zipping around racetracks at up to 200 mph. This means a proprietary system that feeds data to a central hub on the car, which transmits wirelessly to a service provider, who encrypts the data for Red Bull’s use.

Security

Both of these systems are reasonably secure, but this makes them the exception, rather than the rule, as it's difficult to overstate the threat posed by IoT technologies on the network.

This threat is two-fold, but both of the main issues center on the fact that many IoT endpoints are not well secured, in part because it can be difficult in some cases to build robust security into small, simple computing devices.

The first major issue is that a compromised IoT device can, in some cases, offer a way onto a company’s network for a malicious actor. A badly secured smart TV, a security camera, anything that accesses the network is a potential vector for an attack.

The second is that even compromised devices that aren’t used to attack a company’s network directly can be conscripted into enormous botnets of other hacked gadgets, a la the infamous Mirai attacks, which saw armies of security cameras and other poorly secured gizmos blast some of the Internet’s biggest sites offline with floods of junk traffic.

Confusion rules the day around IoT security. One of the principal problems is that even cataloguing every connected device on a network is difficult, and many administrators might not be aware of the full IoT presence in their environments. It's tough to secure something when you don't even know it's there.

Beyond simple visibility, the chaotic state of software development for connected devices is probably the biggest concrete security issue, not only are some devices insecure to begin with, but even if manufacturers issue patches for flaws, they can be difficult to distribute and apply in an organized way. Many don't patch at all, as ongoing software development simply isn't in the budget for certain types of devices.

Numerous experts, including entrepreneur and writer Anil Dash, told the Pew Research Center that the outlook for IoT security simply has to improve, or there will be serious consequences.

“People will continue to connect out of necessity, but the cost and severity of lapses and breaches will increase until it’s a constant, ongoing burden for all,” said Dash.

Yet others were more hopeful, including Wikimedia Foundation fellow Dariusz Jemielniak, who said that solutions exist for a lot of the security problems facing IoT.

“Current technology already offers much higher levels of security than the market actually uses; there is a scope for radical improvement if people demand it,” he said.

Applications

IoT is everywhere, but there are certainly a few verticals where it’s more prevalent. Heavy industry is arguably the sector that’s been working with IoT concepts for the longest, thanks to SCADA and robotics, and it’s got its own sub-type of IoT, industrial IoT, or frequently just IIoT. Sharing data for maintenance and operational purposes makes industrial equipment a lot more responsive and useful, and creates a much safer working environment, as well.

Agriculture is another area where IoT has taken off in a big way, planting, irrigation, harvesting and even soil monitoring have become centralised, thanks to high-precision GPS technology, soil sensors and other systems being wired together in an IoT arrangement.

IoT has changed the day-to-day operations in health care, the ability to share medical data quickly is useful for healthcare workers, even if privacy and security concerns are particularly worrisome in such a setting.

Network World

You Might Also Read:

Fraud And The Internet of Things:

Internet of Lousy Things:

 

« Cybercrime Is A Boardroom Issue
Data Threat: Your Ex-Employees »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.

Cyber Husky

Cyber Husky

Cyber Husky is an agile technology company that specializes in cloud solutions, cybersecurity, and managed IT services.