Skip to main content Skip to main navigation Skip to search Skip to footer
Type to Search Subscribe View Tags

HCL Technologies

The Security Challenge posed by the Internet of Things : Part-1

The Security Challenge posed by the Internet of Things : Part-1
GH Rao - President - Engineering and R&D Services (ERS) | May 7, 2018
500 Views

Many organizations are experimenting with IoT projects, but these bring in significantly different security challenges, which can have far-reaching consequences. An appreciation of these unique challenges is important for the effective rollout of IoT projects.

These challenges differ from those that arise in more conventional technology infrastructures. Strategies that involve ring fencing core systems and applications and tightly controlled access do not work with IoT projects. Here the scale is exponentially multiplied as you’re dealing in real time with potentially tens or hundreds of thousands of small devices spread across large areas. Unlike traditional cybersecurity, which mostly results in data compromise, security challenges of real-time IoT networks can have far-reaching implications for human security and safety.

Popular IoT deployments vary from those of building automation systems and sensor networks to critical connected healthcare solutions, connected vehicles, and industrial robotics. Such deployment scenarios can automate device management, improve efficiencies and reduce operational costs while improving the customer experience. There are opportunities in every business sector and early adopter organizations are racing to secure a first-mover advantage.

IoT systems’ security challenges

Security challenges of IoT systems can be broadly categorized into the three-tier IoT security architecture:

  1. Security of devices: It is important that each device only does what it is intended to do and offers no scope to anyone or anything to infiltrate and reprogram it. With the wide range of IoT devices, there are large sections of the code to be protected either through encryption or access control. While essential for speed and efficiency, OTA (over-the-air) update capabilities for software and firmware updates, can compromise the security of the system. These IoT devices face numerous vulnerabilities because of the way they operate.
  2. Security of communications: IoT communications happen over both public and private networks, industrial networks, and IT networks. Securing network protocols is an important challenge. As a lot of IoT devices have sensors with low computational power, providing data and network-based encryption will fall on gateways, which in turn will need to secure vast amounts of structured and unstructured data in addition to supporting different types of connections (Wi-Fi, Bluetooth, Cellular, Zigbee, NFC, etc.) and device architectures.
  3. Security of cloud/data center: Data from IoT devices goes into cloud and applications. Insecure cloud and mobile interfaces for these applications are huge challenges, as they most often use open-source libraries and technologies. Furthermore, all types of IoT devices and users connect to the cloud remotely. Securing these connections is very important. Rather than securing the entire data store, one would need to secure every data packet as there are innumerable sources with different levels of security.

The challenge of IoT devices

As more devices are added to IoT networks, the security challenge grows.

As more devices are added to IoT networks, the security challenge grows. According to Gartner, around 26 billion IoT devices will be connected by 2020. This gives hackers 26 billion potential targets, posing three key challenges:

  1. Limitations of ring-fencing: A significant proportion of the security challenges surrounding IoT deployments come from the nature of the devices being connected. Since these devices are always connected and periodically transmitting data, the traditional ring-fencing model with intermittently connecting roaming personal devices like smartphone, tablets, etc. is already proving to be a struggle. The small size, large-scale, and distributed nature of IoT devices will overwhelm such cybersecurity models. This is further exacerbated by the expectation that the device will be owned by the customer; yet the onus of its security is on the manufacturer, which then renders moot the ring fence concept.
  2. Limited compute capability of IoT devices: Many such sensors and other monitoring devices have very limited computational capabilities. As a result, the security tools that work on computers often simply can’t be installed due to a lack of CPU power and data storage capacity. Most of such tools are written for computer architectures which are significantly different from those in the devices, nor can one rely on digital certificates mandated by the cybersecurity model. Also, many have not been designed to readily accept updates and patches, which makes ongoing security maintenance problematic. Some also have configuration and security settings set in the firmware that simply can’t be updated. Furthermore, as more insights are gained from the data collected from IoT monitoring devices, these devices are being enhanced to perform corrective actions which then add to the challenges.
  3. Irregular communication patterns: The sheer volume of IoT devices, together with their irregular communication patterns, can overwhelm many security tools. Data patterns that would indicate a compromise or attack in a conventional IT infrastructure are likely to be common in an IoT infrastructure. One of the major reasons for such irregular data patterns is that their communication patterns are logical in the context of the local conditions.

Another reason is IoT network going beyond just connecting devices to being increasingly smarter devices, which trigger contextually adaptive communication patterns. The conventional static models deployed in the infrastructure are bereft of this context and hence, unlikely to handle correctly such dynamic situations. In addition, the knee-jerk reaction of cybersecurity experts to deny access to ring-fenced assets further aggravates the situation.

In the second half of this blog post, we’ll be moving on to explore three specific industry examples of security challenges that IoT deployment can pose and underline the importance of thinking strategically to head off IoT security threats.


Contact Us
MAX CHARACTERS: 10,000

We will treat any information you submit with us as confidential.

We will treat any information you submit with us as confidential.

Sign in to Add this article to your Reading List
Register