The Internet Of Things: How Will We Trust A Word It Says? - Tech Europe - WSJ
But what are the security issues surrounding an internet of 50 billion devices, 48 billion of which are going to be cheap remote sensors of some kind? And what are the security implications? One of the key issues is data integrity. How do you trust the data your sensors are sending? In fact how do you even know it is a sensor that is sending data at all, and not a bot or piece of malware? Then there is the problem of encryption. When smart meters are installed across the grid you can be sure that they will have a high degree of encryption built into them—after all they are likely to be pretty expensive pieces of kit. You can be sure that authentication and encryption will be built in. But what about a cheap (less than €1) sensor that is, say, responsible for reporting whether a parking place is occupied, or one that reports on the tensions in a restraining cable. How much encryption will be built into a 10¢ chip? But if it sends its data unencrypted, and it doesn’t use proper authentication, then it really is a simple matter of jumping in and adding whatever data you want to that stream.  

The Internet Of Things: How Will We Trust A Word It Says? - Tech Europe - WSJ

But what are the security issues surrounding an internet of 50 billion devices, 48 billion of which are going to be cheap remote sensors of some kind? And what are the security implications? One of the key issues is data integrity. How do you trust the data your sensors are sending? In fact how do you even know it is a sensor that is sending data at all, and not a bot or piece of malware? Then there is the problem of encryption. When smart meters are installed across the grid you can be sure that they will have a high degree of encryption built into them—after all they are likely to be pretty expensive pieces of kit. You can be sure that authentication and encryption will be built in. But what about a cheap (less than €1) sensor that is, say, responsible for reporting whether a parking place is occupied, or one that reports on the tensions in a restraining cable. How much encryption will be built into a 10¢ chip? But if it sends its data unencrypted, and it doesn’t use proper authentication, then it really is a simple matter of jumping in and adding whatever data you want to that stream.  

Recent comments

Blog comments powered by Disqus