Sponsored By

IoT Security: An Avalanche of ProblemsIoT Security: An Avalanche of Problems

There are not one but many areas of IoT device security weaknesses.

Gary Audin

August 7, 2015

2 Min Read
No Jitter logo in a gray background | No Jitter

There are not one but many areas of IoT device security weaknesses.

Did you see the "Die Hard" movie where the evil hacker was able to control the traffic lights of Washington, D.C.? Well, it could really happen. The IT industry has paid attention to many forms of IT hacking and malware, protecting resources. We need to pay more attention to the many devices that are being connected to the Internet that are not traditional IT devices.

The Internet of Things (IoT) is leading up to a point where we are looking at billions of devices being connected to the Internet. IoT endpoints can be grouped into four categories: those for consumers (most common are for home automation, security, and safety), business, city, and state. Advances in wireless technologies, miniaturization, lower cost computing with more powerful chips, and large low cost memory all foster the proliferation of attractive IoT devices.

Graduate students at the New Jersey Institute of Technology (NJIT) produced an infographic on preparing for the future. The infographic provides a collection of information and statistics that illustrate the vulnerabilities of IoT.

Two examples of successful IoT use that I know of are:

The infographic sites three additional examples I found worth sharing:

There are not one but many areas of IoT device security weaknesses. There is not one solution; each will require some unique protection. The students collecting and surveying IoT security data were able to determine that:

The infographic cited an effort by the University of Michigan to hack the smart traffic lights of an unnamed city. They gained access to 100 traffic lights using a laptop and basic radio equipment -- proof that the Die Hard movie scenario can happen.

This is not to say that all IoT devices were this vulnerable. It does say the industry producing these devices needs to focus more on the security vulnerabilities. It also means that those organizations pursuing IoT endpoints must perform multiple forms of security testing and analysis of the IoT endpoints they select. Otherwise they open themselves to big public embarrassments.

Read my other previous blogs on IoT security and interoperability: Securing IoT -- Better Now Than Later, IoT Standards: Many, Not One, How IoT Endpoints Measure an Environment, Hacking IoT

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.