How can you Build trust across network domains in IoT devices?

How can you Build trust across network domains in IoT devices?

In the coming future, we might see billions of devices getting connected to the internet. Gartner says that 6.4 billion things will be connected to the internet in 2016 itself. Even though IoT is considered to be a huge digital revolution, it must be secured for its value to be realized.

Consider a scary scenario where an attacker is impersonating a valid user and is able to access data or perform an operation. Or a scenario where another person is observing your authentication pattern while you unlock your car with your phone and gains access to it.

With the advent of IoT and smart devices, there is an alarming increase in the potential opportunities for hackers to steal valuable information ranging from personal data to any intellectual or confidential data. In the wider context of IoT, we can say, device authentication has become more prevalent and necessary.

This means ensuring the users of a device are who they say they are and have the authorized credentials to access the information thereafter. It also includes an understanding what kind of IoT devices we are dealing with. This is because, if you are not sure of the IoT device you are using, then you won't be able to protect your sensitive sensor data or transactions.

With several recent high-profile cyber security attack cases of TalkTalk and Ashley Maddison, it has become important that enterprises assure their customers about the security of networks and build trust in their minds.

In this blog, I present you the measures that you can take to reduce these fraudulent acts within IoT:

1.   Focus on Identity Assurance

IoT network and security designers must first establish the identity assurance requirements of their IoT devices. The assurance or the trust level requirements can vary from device to device, organization to organization. It depends upon the type of application, strength of network or sensitivity of data. You could also examine different IoT device life cycle phases to determine identity assurance requirements at each phase. IoT security designers must use a risk-adaptive approach to determine the phase that requires authentication mechanism. Detection of compromised devices or unidentified users on the network can also be improved through this approach.

2.   Design an Authentication Framework

An IoT framework is complex. It includes heterogeneous devices and identity profiles. Hence, it is necessary to design a trust evaluation and authentication framework to validate all the entities in the network and enable devices to interact securely within and outside the domain.

3.   Choose from Existing Methods

Many IAM planners today are choosing existing methodologies to deliver security policies for governing authentication mechanisms. One such technology is PKI, a popular and widely accepted basis for M2M authentication. It provides cross-platform and multiprotocol approach. Manufacturers and authentication vendors require such technology that can offer cross-platform authentication support for nearly all IoT operating platforms available for commercial as well as enterprise use.

In order for the IoT to truly reach its potential, consumer trust must remain prevalent. Using these techniques, you can provide your customers with a secure connectivity and increase trust in your brand.  

Ian Chard

IT poacher turned gamekeeper | Transforming IT for Higher Education | Musician and law nerd

8 å¹´

The problem from a security perspective is how to tell if a device is secure. Without standards and approvals, I have no way of knowing how much effort a manufacturer has put into security or the testing that has taken place. Security approvals should be part of the UL and CE standards.

Raman Kalia

CX, Omnichannel, InfoSec, Digital Transformation, CRM

8 å¹´

I feel IoT is more of conjunction of small device interfaces connected through peer or host network. While enabling a solution is easy, one will have to guard it with larger enabling or disabling environment so external communications do not interfer or impact. Standalone IoT will always pause risk from limited base system it has.

赞
回复
Lucrecia Burguburu Palacio

Técnico de Hacienda (promoción XX-XXI)

8 å¹´

how to make your customers confortable with your product/service? they need to trust in your brand. Trust is everything in the world of business.Make people talk about it, encourage them to recommend it to others. Word of mouth is the most powerful and the most elusive method of marketing, so if you can take advantage of it you should.

The Anh Vuong, Dr.-Ing.

@ IT Blockchain AI-Applications E-Learning BioEngineering

8 å¹´

We should add the security actions on low level: Network and firmware of router. German Telecom Network was hacked on Nov 27 2016 from a malware using "Bot" - Mirai-Bot net- for IOT Networking. The damage is immense : 900 000 devices was affected!

The Anh Vuong, Dr.-Ing.

@ IT Blockchain AI-Applications E-Learning BioEngineering

8 å¹´

An excellent resume on security at IOT-Networking. Thanks Naveen Joshi !

要查看或添加评论,请登录

Naveen Joshi的更多文章

社区洞察

其他会员也浏览了