|By Jason Bloomberg||
|November 15, 2013 08:00 AM EST||
Your alarm clock jars you awake. You stumble to the kitchen, fire up your coffee maker, grab some milk from the fridge, and pour yourself a bowl of cereal. You turn down the thermostat before you head to your car. You park your sedan in your usual spot in the garage at work, and you enter your office building by waving your badge at the door. Finally, you drop into your chair and fire up your computer.
A mundane story, one millions of people trudge through every day with only minor variations. But here’s the question: how many Internet-connected devices did you interact with between opening your eyes and logging in? Let’s see: alarm clock, coffee maker, fridge, thermostat, your automobile, all the stop lights, traffic cameras, toll transceivers, and in-road traffic sensors on your commute, and finally your badge and the door. OK, maybe your household appliances aren’t on the Internet yet. Give them a few years.
Now ask yourself: how many of those net-connected doodads are secure? The answer: none of them. Every device on this list is woefully unprotected from various attacks, and to make matters worse, many of them might contain confidential information ripe for the picking. And if all that weren’t sufficiently disconcerting, the vendors of such miscellany aren’t particularly motivated to make them secure – even if they knew how to do it properly. Which they don’t. Nevertheless, we blindly forge ahead, building out the Internet of Things (IoT), as though the security issues will somehow resolve themselves. Just how worried should we be?
The Bad and the Ugly – but None of the Good
This tale of woe begins with Radio Frequency Identification (RFID) tags. These innocuous tags appear in everything from product packaging to airport tarmac equipment to passports to, yes, your security badge. And as you would expect from the tone of this ZapFlash, RFID tags are dead simple to hack. They come in two flavors: passive and active. The passive ones need no power source; they simply respond when the right signal gets close enough to them. No encryption, no authentication, no nothing. Anyone with the right device (which you can easily obtain over the Internet, of course) can read your tag simply by getting their snooping device close enough to it. Have you ever walked down the street with your security badge, or through an airport with your passport? Has anybody ever passed within a few feet of you? Stupid questions, right?
So, how do the best RFID security minds recommend protecting your RFID tags from compromise? Put them in protective sleeves. And no, wrapping your passport in aluminum foil won’t do. You need a special Faraday cage sleeve. But even if you manage to keep your RFID tags in an effective sleeve, all a hacker has to do is wait till you take it out. Recommending a sleeve to protect the IoT from attack is about as effective as climbing under school desks was at surviving a Cold War nuke.
Surely the technology in our increasingly cyber-aware automobiles is more secure than your run of the mill RFID tag, right? Sorry, no. Today’s cars have fifty or more tiny computers called electronic control units that control all aspects of the vehicle’s function. These units communicate with each other via a Controller Area Network (CAN). As vehicle manufacturers increasingly provide Internet access to their autos, hackers can easily access the CAN remotely – and with it, all the functions of the car. Brakes. Steering. Engine. Everything down to the radio.
There are two primary modes of protection the car manufacturers are implementing to prevent hackers from using these weaknesses to steal cars, kill targeted individuals, or simply wreak havoc. First, CAN protocols are proprietary. And second, the manufacturers are keeping all the details secret.
Neither technique, of course, provides any true measure of security, as researchers proved at a recent DefCon conference. Secrets are virtually impossible to keep in today’s Facebooked world. Also keep in mind, any authorized repair shop will have a diagnostic machine that interfaces with the CAN. If a hacker doesn’t want to bother reverse engineering the proprietary protocol directly, they can simply get their hands one of those machines and hack that.
Why the IoT is so Hard to Secure
There are both business and technical reasons why the IoT is so difficult to secure. On the technical side, the core problem is that the tried-and-true technologies we use to secure traditional interactions with the Internet just don’t work well – if they work at all. To use Public Key Infrastructure (PKI) technology, for example, each endpoint must be able to store digital keys and run encryption and decryption algorithms, conduct sophisticated handshakes to establish secure SSL connections, etc. However, many IoT nodes like the passive RFID tags simply don’t have the electrical power, storage, or processing power necessary to tackle even the simplest of PKI tasks.
Secondly, a large part of the IoT approach involves machine-to-machine (M2M) communication. In other words, sensors and other IoT endpoints talk to each other, instead of talking to a server somewhere. If your smart thermostat tells your dishwasher when to run, that communication might be running over your home Wi-Fi or perhaps Bluetooth or some other local network protocol that doesn’t require traffic to actually go over the Internet. And not only does it go without saying that Wi-Fi and Bluetooth protocols are shockingly easy to hack, but how are the two communicating nodes supposed to know that the information coming from the other is authorized? Essentially, any kind of M2M interaction requires a certain level of trust, only we have no way of providing that trust in the first place, or revoking it should a breach occur. How will your dishwasher know someone has hacked your thermostat?
In fact, the two examples above provide special cases of a broader problem: the IoT gives us no way to control permissions. Let’s say you figure it’s a good idea for said thermostat to Tweet certain information so it’s easy for you to monitor your home while you’re away. If a hacker compromises the thermostat, they automatically get your Twitter login – and you no longer have any way to control your Tweets.
The final challenge I’ll consider here (keeping in mind there are sure to be dozens of others) is the fact that devices on the Internet must have IP addresses – and in many cases, IoT sensors wouldn’t work properly behind firewalls. They must have public IP addresses that anyone can access. And if someone can access them, then someone will. Ever heard of Shodan? It’s a tool for finding IP addresses for random devices, including baby monitors, Webcams, security systems, and all manner of other bric-a-brac. How would you like a hacker to compromise your baby monitor? It’s happened before, and it’ll happen again.
Scanning random IP addresses, however, is only practical for the familiar IPv4 space. As we move to IPv6, there will be so many possible addresses that scanning them at random will be much more difficult. This advantage, however, is weaker than you might think. First, it simply presents an interesting challenge to enterprising hackers out there. How long will it take for a Shodan 2.0 to be IPv6 compatible? Secondly, IPv6 can actually make it more difficult for an organization with many IoT sensors to secure them (assuming they have any idea how to do so in the first place), because IPv6 makes it more difficult for an authorized party to scan for them as well. And if you don’t know what devices and sensors you have, you can’t control, manage, or secure them.
Such technical issues, of course, aren’t the whole story. On the business side, the problems are even more slippery. There is no agreement on how or even whether to address IoT security. Few countries have any regulation requiring companies to implement security in their devices. And there’s no market pressure forcing such vendors to get their act together. We, the customers, have simply grown too complacent. If we won’t pay more for secure automobiles and refrigerators, then rest assured no company will bother to go through the trouble to secure them.
The ZapThink Take
You were hoping I had some slick, imaginative approach for solving these issues, right? Sorry to disappoint. But rather than throwing our collective hands in the air, dumping all our devices down the garbage chute, and moving to a cave on Borneo somewhere, we must realize that the only way we’ll ever solve this riddle is by taking an entirely different perspective on securing technology.
We cannot impose security from the outside onto each sensor. It’s simply too easy for hackers to get a hold of them and defeat whatever mechanism we’ve put in place. Instead, the sensors themselves must be inherently secure. Only when a hacker can break open a sensor, reverse engineer it as well as the communication protocols it uses, and still not be able to hack into it or use it to hack into something else will we finally be able to sleep at night. Solve this challenge and I promise you, you’ll be very, very rich.
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Oct. 1, 2016 02:30 AM EDT Reads: 2,712
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Oct. 1, 2016 02:30 AM EDT Reads: 643
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Oct. 1, 2016 02:30 AM EDT Reads: 518
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Oct. 1, 2016 02:15 AM EDT Reads: 5,453
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Oct. 1, 2016 02:15 AM EDT Reads: 757
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Oct. 1, 2016 02:15 AM EDT Reads: 2,120
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Oct. 1, 2016 02:15 AM EDT Reads: 514
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Oct. 1, 2016 01:45 AM EDT Reads: 509
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Oct. 1, 2016 01:15 AM EDT Reads: 718
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Oct. 1, 2016 01:15 AM EDT Reads: 3,044
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Sep. 30, 2016 11:30 PM EDT Reads: 773
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 30, 2016 10:45 PM EDT Reads: 1,540
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Sep. 30, 2016 10:00 PM EDT Reads: 1,265
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Sep. 30, 2016 09:30 PM EDT Reads: 4,124
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 30, 2016 09:00 PM EDT Reads: 4,064
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Sep. 30, 2016 07:30 PM EDT Reads: 574
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Sep. 30, 2016 07:15 PM EDT Reads: 488
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 30, 2016 07:00 PM EDT Reads: 2,461
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Sep. 30, 2016 06:30 PM EDT Reads: 2,917
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Sep. 30, 2016 06:15 PM EDT Reads: 3,556