Securing the IoT tsunami

By : Ian Hall, Manager, Client Success, APAC, At Synopsys Software Integrity Group | Thursday, April 29 2021 - 22:55 IWST

Four IoT security challenges
Four IoT security challenges

INDUSTRY.co.id - The Internet of Things (IoT) is a reality. Gartner forecasts 25 billion IoT devices by 2021, and other industry sources and analysts predict even larger numbers. Although projections of unprecedented growth are ubiquitous among industry pundits, the efforts to secure this tsunami of connected devices are in their infancy.

The IoT is still relatively new, so it lacks regulations that mandate security. The potential for misuse, however, is massive-and could lead to major embarrassment (and worse) for businesses and consumers. 

Connected devices have already been utilised to launch massive DDoS attacks on websites, in-home security cameras have been hacked and used to spy on people, and sensitive consumer data has been compromised. 

Timely testing and securing of IoT is the need of the hour.

Four IoT security challenges
IoT systems (including the Industrial Internet of Things [IIoT] and connected machinery) are quite complex from a security perspective, and they pose several contrasting challenges.

Scale

Unlike traditional web apps, IoT software is deployed on thousands and even millions of devices and are always on, so vulnerabilities are magnified over a much wider attack surface.

Lifespan

A lot of IoT devices are embedded within equipment that lasts a long time — even decades (automobiles, subsea devices, HVAC systems, and so on).

It’s often hard to deploy patches on or upgrade the software contained in these devices as frequently. 

The likelihood of vulnerabilities persisting in these devices for months to even decades is extremely high.

Open source operating systems

The large majority of IoT devices run on open source operating systems and on off-the-shelf hardware and networks. The inherent vulnerabilities baked into open source software makes them even more susceptible to attacks.

The 5G network effect

5G is expected to usher in the IoT era to an even greater extent. With its high bandwidth and speed, it will connect everything and remain always on. 

This increases the likelihood of an attack, and a public network is always more susceptible to an attack.

Facets of an IoT deployment
Consider IoT systems within the context of medical devices, automotive equipment, and consumer electronics. 

From a security testing perspective, these mixed-technology deployments have a multitude of potential attack surfaces and technologies that must be protected.

The cloud. The IoT and cloud computing are a match made in heaven. The capacity needed to handle the sheer volume of data as well as the processing required for large-scale IoT adoption can only be driven by cloud computing. 

Smart devices will be connected by default to either edge data centers or centrally located data centers, which will process and store the data they generate. The cloud could also be utilised for IoT device security controls.

Embedded devices. 

Each “thing” within IoT is essentially an embedded computing device that sends and receives information over a network. 

Embedded devices run software and have a smaller memory footprint, along with an operating system and a processor. 

Just like the network they are connected to, these things are all susceptible to attack-especially as they might run old, general purpose, open source software that isn’t often updated for patches.

Web applications. 

Often, IoT devices connect to a web app, and some IoT devices even have an embedded web server. That’s why web app security testing principles apply to IoT security.

Custom applications. 

The IoT is vast and spans apps that power smart cities, automobiles, agriculture, healthcare, and more. Given the wide variety of devices, standards, and technologies applied to IoT, there’s a lot of incompatibility in the ecosystem. Custom apps are therefore widespread in IoT.

The network. 

Most smart devices are always connected by default. They’re connected to the gateways and the back end via a variety of network protocols. 

And just like the cloud, embedded devices, and web/customised IoT apps, the network itself is highly prone to attack.

Mobile devices. 

With the increasing adoption of 5G, the IoT will have the mobile network speed, device density support, and data transfer speeds to support the billions of mobile IoT devices, as well as the mobile apps to control these devices. 

The network, mobile, and the cloud are the three pillars of IoT.

Thick client testing. 

IoT data processing is increasingly moving to the edge to facilitate faster decisioning. Decentralised thick client computing at the edge is common, particularly in devices that may need to operate without connectivity from time to time.

Fuzz testing.

If an IoT device becomes unresponsive or acts abnormally due to inconsistent input, it may affect real-world operation. Fuzz testing simulates what a hacker would do by creating a wide range of corrupt input that will cause the app to fail.

News Comment

Today's Industry

President Jokowi handed over zakat through BAZNAS, Tuesday (28/03/2023), at the State Palace, Jakarta. (Photo: BPMI Setpres/Jay)

Selasa, 28 Maret 2023 - 15:41 WIB

President Jokowi and Vice President Ma'ruf Amin Hand Over Zakat Through Baznas

Indonesian President Joko Widodo (Jokowi) and Vice President (Wapres) Ma'ruf Amin handed over zakat through the National Amil Zakat Agency (BAZNAS), Tuesday (28/03/2023), at the State Palace,…

Source: Public Relations of the Ministry of PANRB

Selasa, 28 Maret 2023 - 14:30 WIB

Starting April 1, the Government Opens Official School Registration

People who are interested in becoming state civil servants (ASN) through this official school can register themselves from 1 to 30 April 2023 through the State Civil Service Agency's National…

President Joko Widodo (Photo: BPMI Setpres)

Selasa, 28 Maret 2023 - 13:28 WIB

The President Affirms the Directive Not to Break the Fast Together Only for Government Officials

Indonesian President Joko Widodo (Jokowi) emphasized that the directive not to hold an iftar together is only intended for officials in the internal government, does not apply to the general…

PT Trisula Textile Industries Tbk ("BELL")

Senin, 27 Maret 2023 - 17:50 WIB

Local Textile Products Made by BELL Boost Income in 2022

PT Trisula Textile Industries Tbk ("BELL"), a textile manufacturer for clothing materials including uniforms, and quality fashion, supports the government's campaign to promote the purchase…

 PT Metrodata Electronics Tbk (“MTDL”)

Senin, 27 Maret 2023 - 16:38 WIB

Achieved the Highest Revenue in History, MTDL Booked IDR 21 trillion in 2022

PT Metrodata Electronics Tbk (“MTDL”), a Digital Information and Communication Technology (ICT) issuer, especially in the field of Digital Solutions and Consulting and Digital Distribution,…