We need cooperation to secure the Internet of Things
Loading...
It鈥檚 a common sentiment of internet-connected device owners and even some manufacturers that the security of an individual device isn鈥檛 so important.
After all, you might think, if it鈥檚 just a few commands being transmitted from my phone to my air conditioning unit to change the temperature in my house, in the grand scheme of things, what can a hacker really do with that?
Quite a bit, actually. 聽
Individual unsecured devices, especially consumer-facing ones, aren鈥檛 so dangerous by themselves, but they become more dangerous as a swarm. We witnessed just such a swarm on October 21, with the Mirai botnet assault on a portion of the Internet鈥檚 phone book (also known as a domain name server, or DNS) that shut down the internet on the East Coast. 聽
When individual devices aren鈥檛 secure, hacking into a large number of devices becomes as easy as hacking into one device.
But a large portion of the threat can be mitigated if companies and developers follow security best practices, many of which are well established and can be practiced today.
What鈥檚 hard isn鈥檛 the practices 鈥 it鈥檚 the coordination and cooperation necessary to succeed.
On a high-level, there are a few easy fixes: devices need unique identifiers; they need authorized users; the two previous data points (users and devices) need to be connected; packets of information sent between devices (air conditioner) and controllers (your phone) need to be cryptographically signed; and any updates to a device鈥檚 most core software (known as firmware) need to be similarly signed by the manufacturer as well.
By maintaining the security of the lanes of communication from users and developers to devices and thus cooperating across the Internet of Things ecosystem, hijacking individual devices becomes much more difficult and it becomes nearly impossible to take over a fleet of devices en masse.
Of course, all of this requires a key consideration on the part of device companies working in the Internet of Things: hard-coding good cybersecurity. The layers of security are undone if hackers discover device specifications that override security, such as hard-coded back doors or unchangeable default usernames and passwords.
The good news? These kinds of practices are being put in place now as the next generation of devices is being developed, spurred on by events like the Mirai botnet (the Chinese manufacturer whose devices formed a large base of the botnet ).
A future where manufacturers and developers implement security procedures from the design stage through production isn鈥檛 just around the corner 鈥 but it is my hope that it鈥檚 coming sooner than many think.