MENU
467330153

Embedding Security in the Internet of Things

July 17, 2014 • Big Data & Analytics, Internet of Things, SPECIAL FEATURES, TECHNOLOGY

By Jim Carlsson

The Internet of Things will mean a better-connected world, with huge possibilities for positive change – and big opportunities for cyber-criminals. Jim Carlsson, CEO of Clavister says security must be placed at the heart of the next generation of smart connected devices.

If you haven’t encountered the phrase before, the Internet of Things refers to the expanding network of interconnected, internet-enabled devices. Driven by miniaturisation, the affordability of components such as cheap Bluetooth sensors, and the growing ubiquity of technologies such as Wi-Fi, it is now possible to connect devices in a way that would never have previously been thought possible.

 

Our increasingly connected lives

To give you an idea of scale, this means that controllers for central heating, lighting, a variety of household appliances from the fridge to your home security system, your satellite TV box, desktop, laptop, mobile and tablet all have the potential to be talking to each other, communicating to a variety of third parties, and to be controlled from a centralised device. This level of Internet connectivity offers a plethora of opportunities to propel us to a more sustainable, energy efficient society as greater control, analysis and insight is presented to consumers and businesses.

It’s an opportunity that some of the biggest names in technology have already jumped upon. Apple recently introduced Homekit, a platform that will co-ordinate various third-party home automation accessories, allowing you to unlock your doors or turn on and off your lights via your iPhone. Google, too, demonstrated its interest by paying £1.9bn earlier this year to buy Nest Labs. Already well known for its connected thermostats and smoke detectors, Nest is currently investigating a slew of other applications related to the home – everything from health tracking to security systems.

 

The more devices that become internet enabled and the higher the level of connectivity between those devices, the greater the opportunity is for hackers to cause damage and disruption.

A window of opportunity for criminals

While this is great, in theory, it should come with a caveat: the more devices that become internet enabled and the higher the level of connectivity between those devices, the greater the opportunity is for hackers to cause damage and disruption. If we simply start connecting an increasing number of devices to the internet without properly considering the security implications, we could hand hackers the opportunity to cut our electricity, flood our homes and pry deeper into our private lives.

Indeed we have already seen the first reported attack which exploited both “smart” household devices and conventional computers. Late last year more than 100,000 consumer devices, including an internet-connected refrigerator, smart TVs and multimedia hubs, were exploited to send more than 750,000 spam and phishing emails.

The majority of the devices used in the attack were not infected by malware, but were simply left open so that attackers were able to use their IP capabilities to relay spam and infected emails. But this incident highlights just how resourceful attackers have become in using unconventional, but effective, attack vectors.

 

Securing the Internet of Things

Now that attacks against these smart devices have begun, they will only escalate and securing this explosion in device numbers will be critical. It goes without saying that, with the potential threats of interception and attack on devices connected to the Internet of Things, a wider spectrum of manufacturers are going to have to consider providing solutions that both connect and are robustly secure.

A new generation of security will be required to protect our connected lives and manufacturers will be tasked with adopting a new generation of protection – embedded security.

However this will not be straightforward due to the limited processing capability and on board memory that many newly connected devices will have. This severely limits the scope for conventional security software, in turn running the risk of leaving newly connected devices in the security dark ages. For instance, as things stand, security will rely upon users changing passwords and other settings away from defaults, and ensuring the devices are not left open – in the same way that people are recommended to protect their home WiFi networks.

Given the increased stakes, relying on such primitive security measures is likely to be futile in the battle against cyber-crime. A new generation of security will be required to protect our connected lives and manufacturers will be tasked with adopting a new generation of protection – embedded security.

Embedded security is the concept of reducing the footprint of robust security software, enabling it to be embedded into the appliance without impacting on the device’s capabilities. This would facilitate the installation of network-based firewalling, web filtering, application control and encryption capabilities within a very small storage and memory usage footprint, enabling secure networking for a wide variety of devices. The upshot of this would be a range of devices operating on distributed but secure environments.

Clavister’s advanced solution enables vendors to utilise existing spare computing power in devices to apply comprehensive network security, using the minimum of extra processing power and capacity.

This kind of advanced security technology will enable IT and communication equipment manufacturers to achieve competitive advantage, differentiation and higher margins for their products by embedding security into IP-enabled equipment such as routers, switches, access points, electricity meters, household appliances and vehicles – in fact, into any device that connects to the Internet. Clavister’s advanced solution is an excellent example as it enables vendors to utilise existing spare computing power in devices to apply comprehensive network security, using the minimum of extra processing power and capacity.

 

Be prepared – or prepare to fail

The possibility that devices in our homes will become increasingly connected and entangled may seem farfetched and the prospect of a criminal using nothing more than a computer to flood a home an idea from science fiction. As outlandish as the concept of “the Internet of Things” may sound it is inevitably going to emerge – as will the increased threat from hackers. It is therefore critical that we integrate security at an early stage in its evolution, to ensure maximum protection against interception, tampering and attacks. Failure to do so might just be catastrophic.

For more information, please visit www.clavister.com

 

About the Author

Jim Carlsson has more than 20 years of experience from the IT industry. Prior to Clavister he worked for Intel Security where he was Vice President for Network and Security Business Unit in Europe, Middle East and Africa. Prior to this, he was CEO and Co-founder of identity and access management vendor Nordic Edge that was acquired by Intel/McAfee in 2010.

 

You might also like:

Leave a Reply

Your email address will not be published. Required fields are marked *

« »