Home    Bloggers    Messages    Polls    Resources   
Tw  |  Fb  |  In  |  Rss
Michael Vizard

The Perils of Security for the Internet of Things

Michael Vizard
Page 1 / 2   >   >>
Sheetal
Sheetal
2/28/2014 12:28:11 PM
User Rank
Worldwide Wizard
Re: The Perils of Security for the Internet of Things
$4 price for a processor is quite a much if looking for IoT devices. The price of processor must come down.

Security has been a issue in internet as such. There are so many applications where one can easily get facbook details, linkedin details, personal photos and other private details. Actually interent was designed to get any information from anywhere. There is no strict internet policing. And since IoT is based on internet, security will always be an issue. 

50%
50%
fdos
fdos
2/28/2014 5:43:43 AM
User Rank
Worldwide Wizard
Re: The Perils of Security for the Internet of Things
@micheal: Yes it will increase the cost but don't you think investing on security measures are vital than the cost ? If the security measures are not upto the standards the ROI will decrease for sure.       

50%
50%
michaelsumastre
michaelsumastre
2/27/2014 11:58:05 PM
User Rank
Worldwide Wizard
Re: The Perils of Security for the Internet of Things
I wonder if beefing up security for IoT devices can lead to higher costs. Like what was mentioned, many companies will realy find it tough add security features and components that are cheap to being with. In the end though, it is better to safe than sorry.

50%
50%
SunitaT
SunitaT
2/20/2014 1:26:35 PM
User Rank
Worldwide Wizard
Re: The Perils of Security for the Internet of Things
@marko: This is really a concern because of the nature of IOT, they remain connected, and Dashboard Intelligence (primarily the car CPU) relays many forms of data to the cloud, which may be used mischievously. The automated car security systems need a proper vamping up.

If the network controller unit is hacked, then the car can be taken anywhere based on the destination protocols.

50%
50%
SunitaT
SunitaT
2/20/2014 1:25:10 PM
User Rank
Worldwide Wizard
Re: The Perils of Security for the Internet of Things
@Davidmicro: Data is heading to the one who is requesting it. Hackers may attack the data en route, but they can't, unless they know not only the traffic on the network, also the data time ID, not to mention the http protocols, now if this is IOT you are talking about then IOT as for one is not secure, as long as data transmission is concerned.

50%
50%
SunitaT
SunitaT
2/20/2014 1:23:53 PM
User Rank
Worldwide Wizard
M2M SECURITY AND TOKENIZATION
The point of security between M2M communications and underlying security layers for the Internet of Things can be minimized with the help of tokenization, but contrary to the software security, it places checkpoints on data security from one point of data packet creation to another point of data packet collection, between two devices. Tokenization, if done properly can reduce the costs of security implementation.

50%
50%
Rich Quinnell
Rich Quinnell
2/18/2014 1:17:56 PM
User Rank
Blogger
Re: Security issues of low-powered devices, lack of patching capability, lack of time-awareness
marko, the paper looks interesting, but it is preferable that you only link to things that do not require registration in order to obtain them, especially when they are your own papers. At the very least, let people know that registration will be required. Otherwise, it looks like an attempt to generate sales leads rather than to contribute to the discussion.

50%
50%
Jamie
Jamie
2/17/2014 11:40:17 AM
User Rank
Worldwide Wizard
Re: Invisible Data on Air
DaeJ, you will always have a problem with wireless data in controlling the area around the device. I picked up an Ubertooth from Sparkfun and I am able to pick up BLE signals from 8m away in open air. If you cannot control access to the device you need to make sure your wireless protocol is very strong and it would help greatly to disable wireless pairing. Both of these are not consumer friendly.  Do you think customers would understand and appreciate having to plug in the device to set up it's network connection? Or would they think a competitor's insecure device is "smarter" because it can be set up without a wire?

50%
50%
Mike Vizard
Mike Vizard
2/17/2014 9:26:08 AM
User Rank
Blogger
Re: Invisible Data on Air
I think we're already starting to see some of this with the rise of software-defined networking. The control plane and the data plane are becoming isolated from one another. Applying security policies to the data would in theory allow that policy to be applied to the data regardless of where it goes.

50%
50%
Mike Vizard
Mike Vizard
2/17/2014 9:22:33 AM
User Rank
Blogger
Re: Levels of security
In theory I agree with this. In practice, however, those low value assets wind up being connected to a high value assest. Hackers have become adept at using low value targets in ways that eventually get them access to higher value targets. The don't call them persistent threats for nothing

50%
50%
Page 1 / 2   >   >>
More Blogs from Michael Vizard
With the flood of IoT data coming, the challenge will be finding and handling that fraction that has real business value.
Collecting the data is only the first step. Analysis that can adapt will help extract useful information from the data.
Turning the automobile into an IoT device may virtually eliminate traffic accidents.
Development challenges are conspiring to retard the IoT's growth.
flash poll
video blogs
SDN's Explicit Forwarding ...
We can't prove based on current usage that SDN ...

1:52

0 comments
IoT Design & the Control Loop
You have to pay attention to the length of the ...

2:01

0 comments
Wearable Tech, IoT & ...
To make wearable tech work we need to be sure the ...

1:57

0 comments
SDN & IoT: It's Complicated
SDN and IoT have some potentially significant ...

2:00

0 comments
3 Dimensions for IoT APIs
Developers building IoT apps will need APIs that ...

2:03

0 comments
How Can We Help Stamp Out ...
What matters is not what you do in an application ...

2:10

0 comments
Another IoT View: ...
Viewing the IoT as a bunch of correlations that ...

2:16

0 comments
IoT, PnP & DIY
Smarter on-net elements for home and process ...

2:07

0 comments
Matching the Cloud & IoT
The cloud, using tools already available from ...

2:04

0 comments
IoT & the 'First Telephone ...
The solution to the IoT's bootstrap problem may be ...

2:06

0 comments
New Single-Board Systems ...
Single-board computers for IoT applications can ...

2:06

0 comments
Taking IoT Security ...
Simple sensors are hard to make smart and hard to ...

2:08

0 comments
The IEEE & the IoT
Howard M. Cohen discusses the IEEE's involvement in ...

1:43

0 comments
No Separate Engineering ...
Howard M. Cohen discusses the likely role of the ...

2:13

0 comments
IoT-as-a-Service
The future for the IoT, at least in the consumer ...

1:26

1 comment
follow us on twitter
like us on facebook
IoT World
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Tom Nolle
SDN's Explicit Forwarding & IoT Security

9|12|14   |   1:52   |   (0) comments


SDN uses a central controller to decide what packets can be forwarded, so it could absolutely control access to IoT elements and provide a high level of security. The problem is scalability; we can't prove based on current usage that SDN could scale to large numbers of sensors and valid users. A second model may be needed.
Tom Nolle
IoT Design & the Control Loop

9|8|14   |   2:01   |   (0) comments


Any sensor application has a path from the sensor through a process point and back to the action point, often called a control loop. You have to pay attention to the length in milliseconds of this path or you risk getting so far behind the thing you're controlling that your application will be useless.
Tom Nolle
Wearable Tech, IoT & Authenticity

9|8|14   |   1:57   |   (0) comments


Wearable tech could be combined with IoT to create useful applications from tracking food/beverage nutrition to identifying the store with the best price by looking at various storefronts. To make it work, though, we need to be sure that what IoT provides is authentic, reliable information on which we can base decisions.
Tom Nolle
SDN & IoT: It's Complicated

9|8|14   |   2:00   |   (0) comments


SDN and IoT have some potentially significant natural symbiosis, but not necessarily in the ways everyone is talking about. Two things of special interest are the notion of a "Control and Sensor Network" built on the model of content delivery networks, and IoT security based on SDN principles, both topics to be covered in future vblogs!
Tom Nolle
3 Dimensions for IoT APIs

9|8|14   |   2:03   |   (0) comments


Developers building IoT apps will need APIs that expose IoT assets in three dimensions: geographic area, subject-tracking, and by-sensor-type. All these APIs will have to accept "credentials" so that data can be filtered by the privileges of the requestor. If all this can be done, we can count on rich IoT apps.
Tom Nolle
How Can We Help Stamp Out IoT Hype?

9|8|14   |   2:10   |   (0) comments


IoT, like most tech these days, seems to be all about hype. We can help realign things by focusing on what matters, which is not what you do in an application sense, but what technology models you expose to related IoT components and users with needs.
Tom Nolle
Another IoT View: Correlation & Context

8|27|14   |   2:16   |   (0) comments


The IoT can be viewed as a network of devices, as a web of information, or as a bunch of correlations that provide context for what we do and see. Taking this last view might help create more IoT value, guide us toward low-apple missions, and focus us on the real security concerns.
Tom Nolle
IoT, PnP & DIY

8|20|14   |   2:07   |   (0) comments


Traditional sensor networks don't put low-level elements on the Internet for cost reasons, but smarter on-net elements for home and process control could make the IoT a lot more accessible. In the end, it may be worth the extra cost to get extra participation.
Tom Nolle
Matching the Cloud & IoT

8|15|14   |   2:04   |   (0) comments


The cloud, using tools already available from providers, could offer significant value-add in IoT applications, particularly in making data available from a large, diverse set of sensors and turning that data into big-data/Hadoop repositories or workflows.
Tom Nolle
IoT & the 'First Telephone Problem'

8|15|14   |   2:06   |   (0) comments


You can't sell the first phone, the saying goes, because there's no one to call. The IoT may face a similar bootstrap problem. The solution may be to focus on placing sensors on the objects that interest us, adding environmental sensors as we build the business case.
Tom Nolle
New Single-Board Systems Offer IoT Value

8|15|14   |   2:06   |   (0) comments


New efforts to create single-board computers for IoT applications may add the most value when the systems are deployed as controllers for sets of local sensors. They can lower costs and improve security. But we need to look at the range of applications to be sure we have the needed standards for accessing these controllers.
Tom Nolle
Taking IoT Security Seriously Is Critical

8|8|14   |   2:08   |   (0) comments


Simple sensors are hard to make smart and hard to keep secure, but we have to make security work to make the IoT work.
Video Blogs
The IEEE & the IoT

7|24|14   |   1:43   |   (0) comments


In a companion piece to his blog, IEEE Claims Its Role in the Internet of Things, Howard M. Cohen discusses the IEEE's involvement in the IoT's governance.
Video Blogs
No Separate Engineering Task Force for the IoT

7|23|14   |   2:13   |   (0) comments


In this companion piece to his blog, Who Governs the Internet of Things?, Howard M. Cohen discusses the likely role of the Internet Engineering Task Force (IETF).
Tom Nolle
IoT-as-a-Service

7|23|14   |   1:26   |   (1) comment


The future for the Internet of Things, at least in the consumer space, may need the offering of services, not just devices.