Home    Bloggers    Messages    Polls    Resources   
Tw  |  Fb  |  In  |  Rss
Michael Vizard

The Perils of Security for the Internet of Things

Michael Vizard
Page 1 / 2   >   >>
Sheetal
Sheetal
2/28/2014 12:28:11 PM
User Rank
Local Activator
Re: The Perils of Security for the Internet of Things
$4 price for a processor is quite a much if looking for IoT devices. The price of processor must come down.

Security has been a issue in internet as such. There are so many applications where one can easily get facbook details, linkedin details, personal photos and other private details. Actually interent was designed to get any information from anywhere. There is no strict internet policing. And since IoT is based on internet, security will always be an issue. 

50%
50%
fdos
fdos
2/28/2014 5:43:43 AM
User Rank
Local Activator
Re: The Perils of Security for the Internet of Things
@micheal: Yes it will increase the cost but don't you think investing on security measures are vital than the cost ? If the security measures are not upto the standards the ROI will decrease for sure.       

50%
50%
michaelsumastre
michaelsumastre
2/27/2014 11:58:05 PM
User Rank
Worldwide Wizard
Re: The Perils of Security for the Internet of Things
I wonder if beefing up security for IoT devices can lead to higher costs. Like what was mentioned, many companies will realy find it tough add security features and components that are cheap to being with. In the end though, it is better to safe than sorry.

50%
50%
SunitaT
SunitaT
2/20/2014 1:26:35 PM
User Rank
Worldwide Wizard
Re: The Perils of Security for the Internet of Things
@marko: This is really a concern because of the nature of IOT, they remain connected, and Dashboard Intelligence (primarily the car CPU) relays many forms of data to the cloud, which may be used mischievously. The automated car security systems need a proper vamping up.

If the network controller unit is hacked, then the car can be taken anywhere based on the destination protocols.

50%
50%
SunitaT
SunitaT
2/20/2014 1:25:10 PM
User Rank
Worldwide Wizard
Re: The Perils of Security for the Internet of Things
@Davidmicro: Data is heading to the one who is requesting it. Hackers may attack the data en route, but they can't, unless they know not only the traffic on the network, also the data time ID, not to mention the http protocols, now if this is IOT you are talking about then IOT as for one is not secure, as long as data transmission is concerned.

50%
50%
SunitaT
SunitaT
2/20/2014 1:23:53 PM
User Rank
Worldwide Wizard
M2M SECURITY AND TOKENIZATION
The point of security between M2M communications and underlying security layers for the Internet of Things can be minimized with the help of tokenization, but contrary to the software security, it places checkpoints on data security from one point of data packet creation to another point of data packet collection, between two devices. Tokenization, if done properly can reduce the costs of security implementation.

50%
50%
Rich Quinnell
Rich Quinnell
2/18/2014 1:17:56 PM
User Rank
Blogger
Re: Security issues of low-powered devices, lack of patching capability, lack of time-awareness
marko, the paper looks interesting, but it is preferable that you only link to things that do not require registration in order to obtain them, especially when they are your own papers. At the very least, let people know that registration will be required. Otherwise, it looks like an attempt to generate sales leads rather than to contribute to the discussion.

50%
50%
Jamie
Jamie
2/17/2014 11:40:17 AM
User Rank
Worldwide Wizard
Re: Invisible Data on Air
DaeJ, you will always have a problem with wireless data in controlling the area around the device. I picked up an Ubertooth from Sparkfun and I am able to pick up BLE signals from 8m away in open air. If you cannot control access to the device you need to make sure your wireless protocol is very strong and it would help greatly to disable wireless pairing. Both of these are not consumer friendly.  Do you think customers would understand and appreciate having to plug in the device to set up it's network connection? Or would they think a competitor's insecure device is "smarter" because it can be set up without a wire?

50%
50%
Mike Vizard
Mike Vizard
2/17/2014 9:26:08 AM
User Rank
Blogger
Re: Invisible Data on Air
I think we're already starting to see some of this with the rise of software-defined networking. The control plane and the data plane are becoming isolated from one another. Applying security policies to the data would in theory allow that policy to be applied to the data regardless of where it goes.

50%
50%
Mike Vizard
Mike Vizard
2/17/2014 9:22:33 AM
User Rank
Blogger
Re: Levels of security
In theory I agree with this. In practice, however, those low value assets wind up being connected to a high value assest. Hackers have become adept at using low value targets in ways that eventually get them access to higher value targets. The don't call them persistent threats for nothing

50%
50%
Page 1 / 2   >   >>
More Blogs from Michael Vizard
Collecting the data is only the first step. Analysis that can adapt will help extract useful information from the data.
Turning the automobile into an IoT device may virtually eliminate traffic accidents.
Development challenges are conspiring to retard the IoT's growth.
flash poll
video blogs
Distributed Security for ...
Security in the IoT will require a distributed ...

2.18

1 comment
Ensure Value in the IoT
Trivial applications of the IoT could turn the ...

1:29

6 comments
Transition to IPv6 Tunneling
IPv6 is coming. Tunneling is the second of three ...

1:49

1 comment
Transition to IPv6 Dual ...
Dual-stack operation is one of three IPv4-to-IPv6 ...

1:57

0 comments
Transition to IPv6 ...
Address translation is the third of three ...

2:14

0 comments
IEEE Holds World Forum on IoT
For a global perspective on the Internet of Things, ...

2:07

0 comments
IPv6 Transition, Part 2
These are the three main approaches to allowing ...

1:54

1 comment
IPv6 Transition, Part 1
The move from IPv4 to IPv6 must be accomplished ...

1:35

1 comment
IoT Security Must Change
Forget firewalls. IT security in the IoT era must ...

1:36

7 comments
Z-Wave Shows Off IoT
Interoperability is a major concern for development ...

2:11

1 comment
Internet Disruption Is Looming
Like the feared Y2K crisis, the transition to IPv6 ...

2:54

1 comment
Beware the Early Adopter
IoT entrepreneurs can be easily misled by the early ...

1:37

2 comments
Bosch Demos the IoT at CES ...
Bosch demonstrates its IoT motion detection sensors ...

1:44

0 comments
Google May Invade Your Nest
With the acquisition of IoT vendor Nest, Google ...

2:25

3 comments
The World in Your Hands
As CES International 2014 has shown, the world is ...

1:59

6 comments
follow us on twitter
like us on facebook
IoT World
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Video Blogs
Distributed Security for the IoT

4|1|14   |   2.18   |   (1) comment


Security in the IoT will require a distributed solution to many problems, including privacy and identity management.
Video Blogs
Ensure Value in the IoT

3|20|14   |   1:29   |   (6) comments


Video Blogs
Transition to IPv6 Tunneling

3|18|14   |   1:49   |   (1) comment


IPv6 is coming. Tunneling is the second of three IPv4-to-IPv6 transition strategies.
Video Blogs
Transition to IPv6 Dual Stack

3|18|14   |   1:57   |   (0) comments


Dual-stack operation is one of three IPv4-to-IPv6 transition strategies.
Video Blogs
Transition to IPv6 Translation

3|18|14   |   2:14   |   (0) comments


Address translation is the third of three IPv4-to-IPv6 transition strategies.
Video Blogs
IEEE Holds World Forum on IoT

3|6|14   |   2:07   |   (0) comments


For a global perspective on the Internet of Things, Korea is the place to be in March.
Video Blogs
IPv6 Transition Strategies, Part 2

2|18|14   |   1:54   |   (1) comment


These are the three main approaches to allowing both IPvx versions to coexist for a time.
Video Blogs
IPv6 Transition Strategies, Part 1

2|18|14   |   1:35   |   (1) comment


The move from IPv4 to IPv6 must be accomplished gradually, so we need to have a way for both versions to coexist for a time.
Video Blogs
IT Security Must Change for the IoT

2|18|14   |   1:36   |   (7) comments


Forget firewalls. IT security in the IoT era must follow a different model.
Video Blogs
Z-Wave Shows How IoT Interoperability Can Work

2|7|14   |   2:11   |   (1) comment


Interoperability is a major concern for development of the IoT. Z-Wave maybe showing us the way.
Video Blogs
Beware the Early Adopter

1|30|14   |   1:37   |   (2) comments


IoT entrepreneurs can be easily misled by the early adopters of their technology. Focusing on that group can lead you into a blind alley instead of market success.
Video Blogs
Bosch Demos the IoT at CES 2014

1|28|14   |   1:44   |   (0) comments


Bosch demonstrates its IoT motion detection sensors in action at CES 2014, providing real-time tracking of attendees on the show floor.
Video Blogs
Google May Invade Your Nest

1|22|14   |   2:25   |   (3) comments


With the acquisition of IoT vendor Nest, Google gains even more ability to peer into our lives.
Video Blogs
IoT Puts the World in Your Hands

1|15|14   |   1:59   |   (6) comments


As CES International 2014 has shown, the world is getting connected and is coming to a smartphone near you.