Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that need management.
Just like the software industry, where security by design is encouraged in software development, the IoT needs to incorporate some sort of checking mechanism to ensure that any data created is sent and received by involved parties only. Is this necessary?
Without a doubt. Whether it’s a sensor-based device or used to perform a specific function, all devices are open to hacking unless preventative measures are taken (we need to enforce security by design). There are several examples of this, from disabling a surveillance monitor on a Turkish pipeline to attacks on medical devices such as insulin pumps and MRI machines. These attacks were potentially life-threatening and indicate that some hackers have no scruples when it comes to target selection or gaining bragging rights to fellow cybercriminals.
Other attacks seem less malicious but still provide food for thought. A baby monitor was hacked, allowing the hacker to talk directly to the infant. Interested in smart guns? Yep, one of these was hacked by a security researcher and his wife. In addition to changing bullet trajectory remotely, they also discovered that the default Wi-Fi password could not be changed.
Clearly, connected devices incorporate risk that could endanger lives or jeopardize the well being of your company or family. To understand the risks, we first need to understand how devices communicate.
The IoT is much more than connected devices and ideally requires an organized and dedicated IoT infrastructure, which is typically viewed as having four distinct stages to reflect the path data travels from IoT devices to final analysis. Data processing can occur at each of these four stages. These stages are:
How each of these stages is implemented will depend on the number of IoT sensors and devices, the volume of data generated and how this data is processed. An effective IoT ecosystem must consider security and authentication is one way of achieving that goal, whether involved in the Industrial Internet or simply leveraging the benefits of IoT devices that complement operational processes.
The ability to secure data and limit it to only those with the correct permissions is not a new idea and is used extensively in many industries. One can only wonder why connected devices were not subject to the same security principles from the beginning.
There are simply too many categories of IoT devices to mention in a post of this size but they vary widely in terms of security levels. Some connect using proximity-based protocols such as Bluetooth, RFID (radio frequency identification), or Wi-Fi while others use GPS, 4G or are hard-wired. Connecting them is often as easy as scanning for nearby devices, by inputting a short code (that may or may not be changed from a default) or by using a form of multi-factor authentication to verify device and recipient permissions.
Cue the game show Jeopardy! “What is IoT authentication?”. The answer is, of course, impossible to define in a short sentence but perhaps in a paragraph or two.
IoT use cases are as varied as the IoT products they utilize but current trends suggest that change is coming, although it may take a while to filter through to all device manufacturers. Most of us are familiar with online shopping. Would you buy from a store that does not utilize SSL, where the lock symbol is displayed on some browsers or the address starts with https? A similar approach to IoT devices is likely and is known as PKI (public key infrastructure) where digital certificates prove the authenticity of the site or in this case, the IoT device.
Digital certificates would ensure a level of trust in an IoT device that may otherwise be lacking and, when combined with IoT applications to monitor the infrastructure, could identify and prevent access to uncertified devices with weak security.
In my opinion, there is no real blockchain vs. PKI argument but it’s worth mentioning. Blockchain’s use of a decentralized ledger could enhance PKI and ensure digital cert management is audit-able and of course any changes made are irreversible. If not decentralized, PKI for the IoT could well be perceived as a financially-motivated initiative by digital cert providers. That said, the primary concern is how to manage authentication.
Regardless of authentication method, IoT security is the aim. You may decide two-factor authentication is sufficient or require SSO (single sign-on) for convenience. You may wish to use Azure IoT to manage all devices. You may have specific requirements for quality of service that require the use of an MQTT client. MQTT (Message Queuing Telemetry Transport) is a messaging protocol and one of many possibly used by IoT devices.
However, IoT devices use a wide variety of protocols and standards and your authentication methods must consider this variation. Therefore, familiarity with these variations is a must and intimate knowledge of the IoT devices purchased is necessary to ensure that each device is capable of authentication in a secure manner. Some may need manual update (lacking OTA functionality) and others may have locked settings that cannot be changed from the default. Perhaps an IoT platform will automate most of your requirements?
In conclusion, IoT authentication methods are necessary to secure IoT devices and there are several ways to achieve this objective. Some may assign dedicated IoT networks, sacrificing beneficial features in the name of security. Bear in mind that it is possible to integrate everything in a manner that is also secure, but you need to ensure that devices are built with security by design. As a result, you may need to decommission some devices but surely that’s a small price to pay for peace of mind and a secure infrastructure?
An Irishman based in Hong Kong, Michael O’Dwyer is a business & technology journalist, independent consultant and writer who specializes in writing for enterprise, small business and IT audiences. With 20+ years of experience in everything from IT and electronic component-level failure analysis to process improvement and supply chains (and an in-depth knowledge of Klingon,) Michael is a sought-after writer whose quality sources, deep research and quirky sense of humor ensures he’s welcome in high-profile publications such as The Street and Fortune 100 IT portals.
Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.
Learn MoreSubscribe to get all the news, info and tutorials you need to build better business apps and sites