小程序
传感搜
传感圈

Security and Trust Issues in IoT

2022-09-20
关注

Illustration: © IoT For All

COVID-19 normalized working from home across a number of industries, which has been welcome news for many. However, one of the unintended consequences of the switch to the home office has been a huge increase in security threats. A survey from Atlas VPN suggests that almost 80 percent of businesses worldwide have suffered from increased security breaches as a result of staff working remotely.

'A survey from Atlas VPN suggests that almost 80 percent of businesses worldwide have suffered from increased security breaches as a result of staff working remotely.' -Pod GroupClick To Tweet

Such is the impact of ransomware that Mandiant, one of the market leaders in resolving issues caused by attacks, are swamped with demand for its services and can no longer cope with it, as their CTO revealed in an interview with NBC News.

While security has always been a consideration for many enterprises, it has not been the number one priority, with security considerations often being added in the developmental stage. However, with the past decade showing a massive increase in malware attacks (up 6500 percent), a change must be made.

Security Issues in IoT

The IoT industry is predicted to expand exponentially in the coming years but cannot possibly continue to exist without putting in place reliable end-to-end security measures. The IoT market is so diverse that a flexible security framework and light-touch regulation are necessary in order to guarantee the security of the market, while also encouraging growth and successful development.

It is quite paradoxical that securing IoT has proven such an impossible task when doing so seems fundamental to its functioning. Until recently, legislation on-device security has been inconsistent geographically, with different laws introduced in different states and countries.

IoT also brings its own set of peculiar challenges. The variety in IoT devices is great, and many are small in size and memory capacity. As a result, these devices lack the complex processing capabilities necessary to support cryptographic functionality, and, in some cases, their operating systems cannot be updated to cope with new threats. All of this, along with their tendency to be located in vulnerable locations, makes IoT devices easy targets for tampering and leads to an abundance of security issues in IoT.

IoT Security Solutions

One of the ways IoT has sought to tackle these issues is with the development of eSIMs. Evolved from removable SIM cards, the eSIM is permanently soldered into an IoT device’s motherboard. It acts as the device’s admission ticket to the internet or appropriate network. Because of the way the eSIM is embedded (hence the e) into the device, they are physically tamper-proof, unlike a traditional removable SIM card.

The eSIM can also contain customizable applets, adding extra levels of security to the data being transmitted and received. The eSIM acts as a kind of security service for IoT, ensuring the transmitted data is genuine. Furthermore, eSIMs can be updated with new settings remotely, enabling them to cope with new threats as they emerge.

Another security solution within IoT is the creation of private LTE networks, also known as private cellular networks (PCNs). Wi-Fi has coverage issues over large areas and more importantly, security flaws. PCNs are able to provide network coverage over a large area while offering the same security offered by cellular coverage.

A private network could also be located behind a corporate firewall, meaning the network can bring data together from multiple systems without relying on the public internet. Furthermore, a connectivity service provider, like an Enterprise Network Operator (ENO), can recognize and isolate any bad actors that do manage to get inside the system.

Security by Design

Cybersecurity cannot continue as it has done and the importance of being cyber risk-aware at all times cannot be understated. Companies must take it upon themselves to embed security from the beginning and at every stage of the IoT value chain, rather than retrofitting it as an afterthought. This methodology, known as Security by Design, is vital in order to enable a secure and trusted market that all stakeholders can rely on for security issues in IoT.

Only in this way can enterprises build trust, protect their customers, and respond to emerging requirements with a unified and collaborative approach. Trust must be the creed upon which IoT is founded, not just at the enterprise-customer level, but also between devices in any network. After all, how can we connect billions of devices and harness them to work together without trust?

Tweet

Share

Share

Email

  • Remote Management
  • Security
  • Cybersecurity
  • IT and Security

  • Remote Management
  • Security
  • Cybersecurity
  • IT and Security

参考译文
物联网中的安全和信任问题
2019冠状病毒病使许多行业的在家办公正常化,这对许多人来说是好消息。然而,转向家庭办公的一个意想不到的后果是安全威胁的大幅增加。Atlas VPN的一项调查显示,由于员工远程工作,全球近80%的企业遭受了越来越多的安全漏洞。正如Mandiant的首席技术官在接受NBC新闻采访时所透露的那样,勒索软件的影响如此之大,以至于作为解决攻击问题的市场领导者之一的Mandiant,其服务需求已被淹没,无法再应对。虽然安全性一直是许多企业的一个考虑因素,但它并不是最优先考虑的,安全性考虑因素通常是在开发阶段添加的。然而,随着过去十年恶意软件攻击的大幅增加(增长了6500 %),必须做出改变。物联网行业预计将在未来几年呈指数级增长,但如果没有可靠的端到端安全措施,就不可能继续存在。物联网市场是如此的多样化,为了保证市场的安全,同时也鼓励增长和成功发展,一个灵活的安全框架和宽松的监管是必要的。这是相当矛盾的,保护物联网已被证明是如此不可能的任务,而这样做似乎是其功能的基础。直到最近,关于设备安全的立法在地域上一直不一致,不同的州和国家采用了不同的法律。物联网也带来了一系列独特的挑战。物联网设备的种类繁多,许多设备的尺寸和内存容量都很小。因此,这些设备缺乏支持加密功能所需的复杂处理能力,而且在某些情况下,它们的操作系统无法更新以应对新的威胁。所有这些,以及它们位于脆弱位置的趋势,使得物联网设备很容易成为篡改的目标,并导致物联网中大量的安全问题。物联网试图解决这些问题的方法之一是发展esim。eSIM由可拆卸SIM卡演变而来,可永久焊接到物联网设备的主板上。它充当设备进入互联网或适当网络的入场券。由于eSIM是嵌入设备的方式(因此是e),它们在物理上是防篡改的,不像传统的可移动SIM卡。eSIM还可以包含可定制的小程序,为正在传输和接收的数据添加额外的安全级别。eSIM作为物联网的一种安全服务,确保传输的数据是真实的。此外,esim可以远程更新新的设置,使它们能够应对出现的新威胁。物联网内的另一个安全解决方案是创建专用LTE网络,也称为专用蜂窝网络(pcn)。Wi-Fi有大面积覆盖问题,更重要的是安全缺陷。pcn能够提供大范围的网络覆盖,同时提供与蜂窝网络覆盖相同的安全性。私有网络也可以位于企业防火墙后,这意味着该网络可以将多个系统的数据汇集在一起,而不依赖于公共互联网。此外,连通性服务提供者,如企业网络操作员(ENO),可以识别和隔离任何设法进入系统的不良参与者。 网络安全不能像过去那样继续下去,时刻保持网络风险意识的重要性不可低估。企业必须从一开始和在物联网价值链的每个阶段都将安全嵌入其中,而不是作为事后的想法进行改进。这种方法被称为“设计安全”,对于建立一个安全可信的市场至关重要,所有利益相关方都可以依赖该市场解决物联网的安全问题。只有这样,企业才能建立信任,保护客户,并以统一和协作的方式应对新出现的需求。信任必须是物联网建立的信条,不仅是在企业客户层面,而且是在任何网络中的设备之间。毕竟,在没有信任的情况下,我们如何连接数十亿个设备并利用它们协同工作?
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

提取码
复制提取码
点击跳转至百度网盘