Info Image

Security in IoT Significantly More Complex Than Existing M2M Applications - Beecham Research

Security in IoT Significantly More Complex Than Existing M2M Applications - Beecham Research Image Credit: Beecham Research

The proliferation of different devices, networks, platforms and applications to support the Internet of Things (IoT), multiplies the vulnerabilities and greatly increases the potential for malicious attacks, according to Beecham Research. The research firm said that the main threat at the network level comes at the interface between different types of network. With a mix of fixed, satellite, cellular and low power wireless networks as well as personal and body area networks (PAN & BAN), the challenge is to secure the transfer of multiple streams of data between selected networks without exposure of key secrets or equipment control, according to Professor Jon Howes, Technology Director at Beecham Research.

Howes believes that the only reason serious IoT breaches are yet to become a critical concern is because the IoT has not yet been deployed in large-scale consumer or enterprise applications that make them attractive to attackers. Beecham points to a number of specific internal and external threats inherent in the IoT ecosystem. When it comes to sensors and devices, the challenge is largely around identification, authentication and authorisation, to ensure a level of trust and avoid risks such as application hijacking. 

The new Beecham Research ‘IoT Security Threat Map’ highlights the key areas where external or internal attacks may originate and where the fast growing IoT industry needs to do more to provide better security controls. Beecham Research believes that while work is going on to secure different parts of the Internet of Things, there is no collaborative effort in the space. 

Professor Jon Howes, Technology Director at Beecham Research
Traditional M2M (Machine to Machine) applications are typically very focused, using specific edge devices, a single network and custom platform, making it relatively easy for security professionals to secure to the acceptable level. But the IoT cuts across different sectors and embraces multiple devices and networks - from satellite to cellular – along with a growing number of IoT platforms and Big Data systems, which present threats on many different levels and fronts. Wherever there is a new interface between devices, networks, platforms and users, there is the potential for a new weak link.

Robin Duke-Woolley, CEO at Beecham Research
Security in the Internet of Things is significantly more complex than existing M2M applications or traditional enterprise networks. Data must be protected within the system, in transit or at rest and significant evolution is required in the identification, authentication and authorisation of devices and people. We must also recognise that some devices in the field will certainly be compromised or simply fail; so there needs to be an efficient  method of secure remote remediation – yet another challenge if the IoT is to live up to expectations.

Author

Ray is a news editor at The Fast Mode, bringing with him more than 10 years of experience in the wireless industry.

For tips and feedback, email Ray at ray.sharma(at)thefastmode.com, or reach him on LinkedIn @raysharma10, Facebook @1RaySharma

PREVIOUS POST

US Taking Lead, Global Smart Home Market to Hit $115 Billion in 2019, Says Strategy Analytics

NEXT POST

RAN Hotspots are Getting Hotter with 20% Sites Accounting for 80% Traffic, MNOs Need 'Smart Data' Capacity Strategy - Amdocs