Secure Connectivity - Why It's Important and How to Implement It
Michael VedomskeMichael Vedomske
For many people, talking about security is about as interesting as a trip to the dentist. So why should you care about security? If you care enough to invest in an IoT solution, you should care about security on the Internet of Things.
In fact, Gartner proposes that overcoming security issues is the lynchpin to the Internet of Thingsâ success.
But does it really matter if your refrigerator, oil field devices, or asset tracker can be hacked? It does. Letâs take the first example, your refrigerator.
Your refrigerator itself may not be immensely valuable to hack, but the Google account credentials your refrigerator uses to display your Google calendar can be obtained because of poor security. Caring about security is a reflection of the value of the things that should be secured and what those things are connected to.
The Internet of Things (IoT) is supposed to increase our ability to control and monitor the world around us in an intelligent and often automated way. But as those connected devices increase, and become ever more interconnected, the importance of security increases. Interconnected devices are as strong as the weakest link.
When considering security on the Internet of Things, think about how valuable your entire system of connected things is. If you're going so far as to invest in devices that are connected, then why leave off security?
Investing in IoT connectivity for your business or home without security is like buying a car without locks. âBut the car does what I need it to do! Security is no big deal right?â Except that the car could easily be stolen and do what somebody else needs it to do.
And with IoT connectivity, the data collected is valuable, and could be used to compromise your business without your even knowing it until it is too late. No matter the data being collected, there are other patterns of your business that could be gleaned from your data collection habits and business operations.
Your data and the system that supports that data is highly valuable, donât leave it exposed by choosing connectivity without robust security.
With security by design, security is built in from the beginning. It isnât a bolted-on afterthought. This can make a serious difference. Imagine buying a house made of reeds, and then after it's done, the builder decides to âadd securityâ by installing a simple lock on the front door. Intruders will just ignore the lock and make a hole straight through the wall! That seems a little far-fetched but it really isnât too far off from what happens when a wireless protocol isnât secure by design.
IoT security that is simple, is IoT security that is clear and transparent. You can see how the pieces come together to create a comprehensive suite of IoT security protection. A glob of security features doth not strong security make.
Following standards enables utilities and other critical infrastructure providers meet theirs. This helps nuclear power plants, oil and energy providers, smart grids and other vital utilities remain compliant with Federal standards and guidelines.
Without this compliance, these entities could be fined up to a million dollars a day.
Encryption keeps your messages confidential. Itâs basically a super fancy way to scramble messages that only gets unscrambled with the right key or password. But message confidentiality is only step one.
Imagine a street lighting solution without replay protection, it would be pretty easy to mess with lighting if you capture the encrypted, but unprotected, message that controls on and off. Without message integrity and replay protection the message will be let on through causing unauthorized device déjà vu.
With mutual authentication, the device knows the network is real and the network knows the device is what it says it is. Is some stranger trying to get in your devicesâ team huddle? Mutual authentication keeps them out.
If Batman were a device on a network with device anonymity, it would never reveal that he was actually Bruce Wayne⊠oh wait, whoops.
Secure multicasts guarantee that even when many devices are receiving messages, like street lights beings asked to turn on or off simultaneously, they are all protected.
And then there's Mirai. Home-baked to exploit IoT devices, it wreaked havoc on DNS servers using the likes of routers, connected video players, and more, cutting off millions from internet access.
Eeek! Luckily, after they were detected, patches were developed that protected against these security threats when downloaded and installed.
But wait. What if those infected PCs and IoT devices could never download the updates? What if they were eternally stuck in the same vulnerable state just waiting for the hack to happen, or were already compromised? Talk about being left sitting high and dry! Now imagine that those PCs and IoT devices are actually your devices sitting on an IoT network, but that network doesnât have firmware upgrade capabilities. Thatâs about as comforting as a cactus blanket.
There's a better way, and that way is the capability to download firmware upgrades, for any purpose, to your devices.
If you ever need to improve device capabilities, beep, beep, boop, firmware downloaded and installed. This feature includes device security upgrades, as the firmware upgrade could be a simple patch to address a security vulnerability. This kind of feature gives you true peace of mind so you can run your business knowing that, worst case scenario, you can address vulnerabilities that may arise.
Another added benefit of being able to send firmware upgrades to your devices is that you can be proactive in improving your solutionâs performance and efficiency. Any improvements in the firmware design can be propagated to your devices, allowing for possible improvements in other areas like battery life and sensor performance. This allows solution providers and their customers to increase the value of their IoT investment.
An IoT connectivity provider that lacks device security upgrades is leaving its customers in harmâs way. Keep devices secure and adaptable to changing cyber security conditions by enabling device security upgrades.
IoT security, donât connect without it
Â
The Most Comprehensive IoT Newsletter for Enterprises
Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.
New Podcast Episode
Recent Articles