Sponsored By

Securing IoT -- Better Now Than LaterSecuring IoT -- Better Now Than Later

Implementing IoT security is like buying insurance: the enterprise does not expect to file an insurance claim, but it must invest in insurance in case of a problem.

Gary Audin

April 17, 2015

5 Min Read
No Jitter logo in a gray background | No Jitter

Implementing IoT security is like buying insurance: the enterprise does not expect to file an insurance claim, but it must invest in insurance in case of a problem.

I am a protestor and want to make a statement by interfering with a company's Internet of Things (IoT) network. Maybe I want my local transportation system to respond to my complaints, so I cause disruption to its traffic control systems. I could be a disgruntled or former employee or student who is angry, and I want to ransom the IoT operation of an organization. I am a contractor who does not follow the security policies and procedures of my customer. Or maybe it's as simple as me updating my IoT devices and making a mistake that hampers IoT operations.

Any or all of these situations can be prevented with the judicious deployment of security features in an IoT network. The IT industry had to play catch-up with ferreting out IP endpoint and network security vulnerabilities after the fact; when implementing an IoT network, the same sort of catch-up can be mitigated with proper security planning.

One of the dangers with IoT is that it may be implemented by operations rather than IT staff. This is potentially problematic because the operations staff usually has experience with physical security, but not with information security and networks, so security vulnerabilities may not be well anticipated or understood. But implementing IoT security provides an opportunity to get ahead of the game.

The single biggest observation about IoT is the number of potential endpoints that will exist. The number of endpoints per person today averages about 2.7, with some people using up to 7 endpoints. These endpoints could be cell phones, tablets, laptops, wearable devices, sensors (especially in business situations), etc. (see How IoT Endpoints Measure an Environment).

Most IoT endpoints are designed to be inexpensive, have a long operational life (five to 10 years), require little lifetime maintenance, have long battery life, and most likely communicate over wireless networks. The low cost is designed so that many endpoints can be deployed with a positive ROI; therefore there is a modest budget available for security features to be included in the actual endpoints.

There is no single approach to IoT, standards a so each standard, as well as proprietary approaches, will have differing levels of security. There are security add-on products, but they may not protect all IoT networks equally. Some technologists even propose that a new architecture is required for IoT success.

Content privacy of sensor-generated data is one important aspect of IoT security. Within healthcare environments in particular, this data must be secured and needs to comply with regulations. The issues of content accuracy and integrity also come into play. The same could be said for corporate data. The organization's financial and operational health could be at risk.

Security issues include endpoint access, data transport over networks, embedded applications at remote locations and the data center, and laws and regulations that cover personal and financial data. Other factors include:

  • Data longevity

  • Risk longevity

  • Safety, both personal and corporate

  • Breach detection

  • Breach prevention

  • Problem resolution

A major difficulty when a security breach occurs is determining how bad it is. The impact can range from minor to catastrophic, and it's not always easy to determine who has been affected. Next, the impact of the security problem on the users and network and data centers can take a while to discover -- sometimes months, as has been the case in recent retail security breaches. A well-planned security breach can go undetected for as long as a year, which makes it even more difficult to assess the impact.

There are five objectives for any IoT security:

  1. Authenticating the endpoint data sender (a network issue)

  2. Authenticating the data receiver (a data center or cloud service; a network issue)

  3. Controlling endpoint and receiver accessibility, ensuring that they are online or can be commanded to be online

  4. Ensuring that data content is sent correctly, is accurate, valid, and up to date; otherwise erroneous data leads to erroneous conclusions

  5. Protecting the confidentiality of the data collected as required using encryption

These goals must be reasonably economical to implement. If too expensive, it is possible that the IoT implementation cannot be afforded.

Paying for security is a tradeoff between protection, risks, and budgets. A really secure IoT environment may be unaffordable. The enterprise needs to evaluate the risks for different levels of security investment. The security solutions have to be easy to implement and manage.

It is relatively easy to calculate TCO; it is hard to produce a positive ROI. Those proposing the security investment have to perform due diligence by studying other organizations' security problems and how much the problems affected a particular organization's expenses. Implementing security is like buying insurance: the enterprise does not expect to file an insurance claim but it must invest in insurance in case there is a problem.

Security investment needs to cover six areas:

  1. Endpoints, remote and data center/cloud

  2. Transport network, wired and wireless

  3. Network infrastructure including management, control, and monitoring

  4. Data connections, Internet and/or private networks

  5. Data center servers and cloud services

  6. Business systems and personnel that access and process the collected data and control the endpoints

The enterprise may choose to outsource much of IoT operations to a cloud service, thereby outsourcing most of the security investment to the cloud service. This means less IT staff effort and a faster time to implementation, which is especially attractive if the number of IoT endpoints is expected to rapidly increase. Cloud services can scale faster than an internal system and network. The adoption of standards as well as complying with regulations becomes the problem of the cloud service provider. If the implementation of IoT is to be performed by operations rather IT personnel, then the cloud approach is probably the safest and fastest method to adopt.

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.