Internet of Things (IoT) Review

 

The Internet of Things, or IoT, is a system of inter-related computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and each has the ability to transfer data over an Internet network.  This process does not require human-to-human or human-to-computer interaction.  The data is then collected and analysed from lots of different machines and objects and put into the same code and the specific message about different items and objects can then be sent to the relevant people and machines.

Much has changed since 2013 when the Internet of Things emerged as the next shiny tech bauble. The challenge in understanding IoT is not only that the technology is constantly evolving, but that the definition keeps expanding from an original focus on machine-to-machine (M2M) applications that communicate without human intervention. Many analyses include a whole range of what we used to call embedded computing gear, including high-end networking and digital signage equipment. 

Other definitions more logically include drones, robots, automotive computers, and wearables. Market estimates and forecasts that IoT will be a $6.2 trillion industry by 2025.

The Internet of Things is part of the new beginning of an electronic revolution that like earlier industrial revolutions will substantially alter and change our society. The development is probably best described as the 4th Industrial Revolution.This 4th Revolution employs deep data analysis with interconnections and links to Bio-technology, Artificial Intelligence, robotics and the Internet of Things all of which will significantly alter us as humans and the places we work and live and it has already changed crime and is changing warfare.

The Internet of Things describes the expansion of the Internet far beyond the traditional computing systems and items like mobiles and personal computers into a range on conventional non-electronic devices and items that can be connected and controlled by such systems as smartphones. 

This could apply to ‘smart homes’ where lots of fixtures like home security systems, cameras heating and appliances could be controlled by mobile phones. All of these issues need real attention as the electronic world of social networks, commerce and government is on a continual change and the Internet of Things is one of next significant changes.

The Internet of Things - IoT

The Internet of Things, often verbally reduced to IoT, describes a large group of objects that can connect and share electronic data and information. The name Internet of Things (IoT) was created by Kevin Ashton in 1998 before anything other than computers where connected to the Internet. He wanted society to create an interconnected Internet connecting all areas of society. 
The IoT works by embedding mobile transceivers into a wide range of different items which allows connection and communication between items and items and sometimes people. It has added a new and different aspect and dimension to global data and connections. These interconnected objects can include everything from banknotes, cars, aspects of the human body to massive industrial devices and machines. In order to be able to interconnect the objects use the internet protocol or IP, which is used to identify and globally connect computers on the world wide web.

  • The purpose of IoT is to enable machines and objects to be able to report in real time. This process improves the ways in which information and data can be collected and read without the need for human intervention.
  • The IoT aim is to instant access to information and data about the physical world objects so as to increase global proficiency, efficiency and productivity. 

In the last couple of decades, computers have begun to become more independent of their operators. In the twentieth century computers only did what the operator told them to do but now in the twenty first century with the Internet of Things computers are beginning to act alone. 

  • Soon self-driving cars and vehicles will take over many roads and this will save many thousands of lives every year and this process will reduce traffic and exhaust pollution. 
  • Many things will be inter-connected electronically in the next decade and as the 4th Industrial Revolution takes over most businesses experts are currently predicting that more than 50% of commercial business will be at least partially run by IoT by early 2020s.

The new era of the Internet of Things is beginning to have a social impact and this process will have both some positives and negatives for the future of security. 

Alongside this change, another emerging technology called Blockchain is becoming important. Cybersecurity platforms running on Blockchain technology will secure devices and appliances using digital technology. Analysts say two leading German companies, Volkswagen and Bosch, are changing the way they work by connecting the Internet of Things (IoT) to the decentralised data market and will use Blockchain as the way forward.

Future Security

Video surveillance is often considered to be an IoT application, and cameras are bundled with many home automation systems. Video, after all, is nothing but a visual sensor, even if it’s one that requires more processing power and higher-bandwidth communications.  The controversial role of surveillance, which extends beyond video to other forms of home automation monitoring, has led some to decry IoT as the enemy of privacy. 

Home surveillance may make it easier to keep tabs on pets, small children, and the elderly, but it also makes it easier to spy on each other, threatening traditional bonds of trust but also there is Blockchain that decentralises the working platforms and makes a cyber-attack far more difficult to achieve and this adds protection to IoT networks. Bosch and Volkswagen have connected to the IOTA Foundation and are going to use a Distributed Ledger Technology which is a crypto-currency designed for the Internet of Things and created by IOTA.

 IOTA is established as “the main currency for machines,” the organisation claims.

  • Volkswagen has also been surveying IOTA for blockchain, and other alternative-technology distributed ledgers, include authenticating mileage use. 
  • Bosch said in November 2018 that it wants to use the non-profit IOTA with camouflaged communications channels as it said that logistics is a massive manufacturing global industry and most industries have gone through significant change and innovation but the logistics is too slow. “It can be said that any use case is feasible where the Bosch XDK measures sensor data, and there are potential buyers for this data,” Bosch explains.  “Blockchain technology makes it possible to generate and store all the necessary documents online on a single platform accessible to all.

IOTA says “Enabling the true Internet-of-Things through the Machine Economy will allow all parties have access to the same information, there will be far fewer disputes and reconciliation problems, so the process will be quicker and more efficient.” 

The number of connected devices that will be in use is estimated to reach 75 billion by 2025. From tiny sensors on roads and bridges to wearable electronics, mobile phones, and more, every day the world is becoming more and more interconnected”. 
“People and machines can transfer money and/or data without any transaction fees in a trustless, permission-less, and decentralised environment.” 

There are of course a number of other distributed ledger technology companies and Hyundai’s blockchain system allows processing of payments over Bitcoin and integrates other blockchain networks.

Where Is The IoT Going Next?

Even those who have purchased one of the myriad smart home products, from light bulbs, switches, to motion sensors, will attest to the fact IoT is in its infancy. Products don't always easily connect to each other and there are significant security issues that need to be addressed. 

A report from Samsung said the need to secure every connected device by 2020 is "critical". The firm's Open Economy document says "there is a very clear danger that technology is running ahead of the game". The firm said more than 7.3 billion devices will need to be made secure by their manufacturers. “We are looking at a future in which companies will indulge in digital Darwinism, using IoT, AI and machine learning to rapidly evolve in a way we’ve never seen before," Brian Solis, from Altimeter Group, who helped on the research said.

IoT botnets, created using a network of out-of-date devices took websites and some services off-line in 2016. A Chinese firm later recalled 4.3 million unsecured connected cameras. The ease of bringing down the Internet using IoT devices was revealed when instead of malicious purposes, the botnet was revealed to have been created to game Minecraft.

What Are The Privacy Implications?

Everything that's connected to the Internet can be hacked, IoT products are no exception to this unwritten rule. Insecure IoT systems led to toy manufacturer VTech losing videos and pictures of children using its connected devices. There's also the issue of surveillance. If every product becomes connected, then there's the potential for unbridled observation of users. 

If a connected fridge tracks food usage and consumption, takeaways could be targeted at hungry people who have no food. If a smartwatch can detect when you're having sex, what is to stop people with that data using it against the watches' wearer.

“In the future, intelligence services might use the Internet of Things for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,” James Clapper, the US direction or National Intelligence said in 2016. Indeed. Wikileaks later made claimsthe CIA has been developing security exploits for a connected Samsung TV.

We Need Reliable Standards

At the centre of creating a vast, reliable IoT network lies one significant issue: compatible standards. Connected objects need to be able to speak to each other to transfer data and share what they are recording. If they all run on different standards, they struggle to communicate and share. The Institute of Electrical and Electronics Standards Association lists a huge number of standards being developed for different applications. "Additional needs are emerging for standardisation," the Internet Society says. If standardisation happens it will let more devices and applications be connected.

To try and tackle this issue on an enterprise scale, Microsoft has introduced its own system for IoT devices and claims the system will simplify the creation of IoT networks. Caroline Gorski of Digital Catapault has described IoT, even among those with the most experience of the concept, as a "relatively immature market" but said 2016 may have been a turning point. The Hypercat standard is now supported by ARM, Intel, Amey, Bae Systems and Accenture and the firms are agreeing a format for "exposing collections" of URLs, for example... "In the short term, we know IoT will impact on anything where there is a high cost of not intervening," Interviewed by Wired, Matthew Evans of TechUK said. "And it’ll be for simpler day-to-day issues, like finding a car parking space in busy areas, linking up your home entertainment system and using your fridge webcam to check if you need more milk on the way home. "Ultimately what makes it exciting is that we don’t yet know the exact use cases and just that it has the potential to have a major impact on our lives."

References:

Wired:      Linux:      Techtarget:      Image: Unsplash

You Might Also Read: 

Better Cyber Security For Smart Devices:

 

« eBook: Practical Guide To Optimizing Your Cloud Deployments
Cyber Insurance: What to Expect In the Next 5 Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

tunCERT

tunCERT

TunCERT is the National Computer Emergency Response Team of Tunisia.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.