Hardware Threats to an IoT Ecosystem

LEVEREGE | March 31, 2020

article image
An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Spotlight

inside secure

Inside Secure (Euro next Paris – INSD) is at the heart of security solutions for mobile and connected devices, providing software, silicon IP, tools and know-how needed to protect customers’ transactions, content, applications, and communications. With its deep security expertise and experience, the company delivers products having advanced and differentiated technical capabilities that span the entire range of security requirement levels to serve the demanding markets of network security, IoT security, content & application protection, mobile payment & banking. Inside Secure’s technology protects solutions for a broad range of customers including service providers, content distributors, security system integrator, device vendors and semiconductor manufacturers.

OTHER ARTICLES

Role of IoT in HVAC

Article | February 17, 2020

Implementation of the “Internet of Things” in the modern world is gaining pace at breakneck speed. Society is moving away from standalone devices and entering the realm of inter-connectivity. With uses in different facets of life, such as personal gadgets, retail, electricity distribution and financial services, IoT is making its mark. One such application field of IoT is in Smart Homes, or more specifically in the Heating, Ventilation, and Air Conditioning industry (HVAC). According to a report by Zion Market Research, the global smart HVAC control market is expected to reach almost USD 28.3 billion by 2025 as compared to USD 8.3 billion in 2018. Amalgamation of the HVAC industry and IoT provides for vastly superior customer-centric services, enabling remote appliance control as a first step.

Read More

The road to industrial IoT security

Article | February 25, 2020

One of the main topics of this year’s RSA Conference is IT-OT cybersecurity convergence. But what are we talking about? Industrial IoT (IIoT) is all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more. In the traditional IT world, security risks involve threats that would undermine the confidentiality, integrity, and availability of data and systems. Given that in 2019, $3.5 billion was lost to known cyber-scams and ransomware according to the FBI’s Internet Crime Report, the impact is largely financial. IIoT drives the physical world where operational technologies (OT) are used. The risk in IIoT environments involves threats that would undermine the operational safety (physical security of goods and people, environmental impact) and the availability or even the physical integrity of the production process. Theft of intellectual property and trade secrets is a major concern, and the impact is not just financial, but also social, human, and ecological.

Read More

Securing industrial networks: it’s a journey

Article | April 14, 2021

Trying to secure the industrial network in one go is like boiling the ocean. Better to view it as a journey. At each step in the journey, you’ll make incremental changes to people, process, and technology. Minimal security. This is the current state for most manufacturers. If you’re here, you’ve segmented the industrial network from the IT network. Traffic can’t cross from the IT network to the industrial network without clearing the DMZ. You can block malware from entering the industrial network. You can block malware from leaving the industrial network to infect the enterprise network. But if the industrial network is exposed to malicious software, you don’t have a way to contain it. That means the malware might affect multiple manufacturing cells or production lines — even multiple plants.

Read More

Artificial Intelligence Applications: Is Your Business Implementing AI Smartly?

Article | March 12, 2020

The book Design, Launch, and Scale IoT Services classifies the components of IoT services into technical modules. One of the most important of these is Artificial Intelligence (AI). This article is intended to supplement the book by providing insight into AI and its applications for IoT. After many years in the wilderness, AI is back on the hype curve and will change the world again. Or, will it? AI has always been interesting, but what has changed to justify the current hype? There are several contributing factors. The volumes of data that will be produced by many IoT services suggest that this data cannot be managed by humans with traditional analytics tools. Therefore, AI can offer opportunities for IoT services to extract maximum value from the data. IoT cloud platforms are now offering AI services via APIs and application development tools, making AI more accessible for many IoT services. Now, AI can be incorporated without requiring extensive development or excessive costs.

Read More

Spotlight

inside secure

Inside Secure (Euro next Paris – INSD) is at the heart of security solutions for mobile and connected devices, providing software, silicon IP, tools and know-how needed to protect customers’ transactions, content, applications, and communications. With its deep security expertise and experience, the company delivers products having advanced and differentiated technical capabilities that span the entire range of security requirement levels to serve the demanding markets of network security, IoT security, content & application protection, mobile payment & banking. Inside Secure’s technology protects solutions for a broad range of customers including service providers, content distributors, security system integrator, device vendors and semiconductor manufacturers.

Events