• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Outside the Cloud: How to Secure Devices in the IoT

Dan Matthews / 4 min read.
November 13, 2017
Datafloq AI Score
×

Datafloq AI Score: 81.67

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/dVR3a

Imagine walking into your home and suddenly becoming aware of an unknown presence. Only it’s not someone hiding in the closet and it’s not someone lurking just out of sight around the corner. It’s someone monitoring you through one of your many connected devices. Although your smart home provides you with unprecedented convenience, the internet of things (IoT) also provides a portal through which hackers can take control of devices or monitor your movements and your words.

The IoT presents cybersecurity headaches because it adds a whole new level of complexity to cloud computing ‘it increases the volume of data exponentially ‘and thanks to edge computing, it increases the number of data access points. Right now, regulatory agencies enforce cloud compliance standards related to software validation, data integrity and cyber security. So, any company with an IoT device ‘such as a life sciences company that is making a connected medical device in a booming industry ‘must make sure the cloud software for the device meets cybersecurity standards.

Yet, when it comes to the IoT’s viability in conjunction with the cloud, the jury is out. On one hand, the IoT as it stands now wouldn’t exist without the cloud, which provides warehouse, analysis/visualization, and deployment functions for all the data smart devices create. On the other, the number of connected devices is due to grow exponentially by 2020. As observers are pointing out, it doesn’t seem feasible for the centralized cloud to handle the amount of big data connected devices will create.

Centralized cloud computing has two big limitations when it comes to meet the demands of a connected world: bandwidth and latency, says Siavash Alamouti, CEO of mimik. There will be about 50 billion connected devices by 2020. Alamouti anticipates a bottleneck effect in which cloud networks can’t receive, process, and transmit data from devices fast enough due to limitations in bandwidth size and processing speeds. He recommends an edge cloud (fog) of devices, such as laptops and smartphones, that act as cloud servers. Of course, Alamouti’s company, mimik, specializes in converting computing devices into edge cloud server nodes, so he has a stake in seeing this happen.

Alamouti’s point isn’t misguided though. Marty Puranik, whose company Atlantic.Net specializes in cloud hosting services, points out that there are already cracks beginning to show in the system of IoT and cloud compatibility. The cloud does all the work and the smart device is merely the messenger, which puts a lot of stress on the cloud. He notes that AWS (Amazon Web Services) went offline for four hours in February of 2017. That’s the longest it’s ever been offline, and AWS is the biggest cloud infrastructure-as-a-service (IaaS) provider, with a market share of 40 percent. The other major players ‘Google, IBM, and Microsoft ‘account for a combined 23 percent of the IaaS market. Puranik’s conclusion is that fog computing is on the horizon to help solve incompatibilities between IoT and the cloud.

So, once the edge cloud fully enters the picture, there will be three levels concerned with IoT cybersecurity: firmware (software embedded in connected devices), edge computing server nodes, and the cloud.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

Securing IoT devices is much like securing devices you already use to connect to the internet:

  • Firmware must be updated regularly
  • Devices should require user authentication ‘including knowledge factors (information specific to a user: unique ID, password, security question), possession factors (verification, through security token or pin, that the device is in your possession), and inheritance factors (biometric information or device-specific cookies)
  • Encryption keys and SSL certificates should also be implemented in order for the device to transmit data

IoT devices don’t typically meet all of the above security criteria. There aren’t regulations forcing device manufacturers to make data security the number one priority. Connectivity and sales are the number one priority. The problem with a smarthome right now is that connected devices come from a variety of manufacturers, and they don’t all follow the same security protocols. When all of the devices are linked, outdated firmware in a single device creates vulnerability for the entire system.

And that’s just at the device level. Edge computing server nodes will present another layer that must communicate date securely from the device to the cloud. If nodes aren’t regularly updated and monitored for malicious code, data from devices could be easily compromised at the edge.

This high level of complexity doesn’t look promising for the IoT. TechCrunch contributor Jon Hedren says, The IoT dream’ as sold by the industry is pretty cool, but it’s still just a dream. For now, these devices remain generally shoddy, insecure and easily breakable and must be treated that way, especially when the stakes are high.

The only way to solve this problem will be to minimize complexity. With thousands of manufacturers free to operate as they please within the security spectrum, there are too many vulnerable points. Governments need to implement strict and uniform regulations for these devices, such that, if a device manufacturer doesn’t adhere to regulations, they can’t sell their product in any of the cooperating countries.

On an endnote, adding edge computing onto centralized cloud computing for the IoT makes sense, but it adds yet another layer of complexity. A blockchain infrastructure could replace both edge computing server nodes and the cloud. This doesn’t look likely with huge players like Amazon and Google in the mix, but with the future of IoT security looking so unclear, it’s well worth considering.

Categories: Cloud, Cybersecurity
Tags: Big Data, cloud computing, connected world, Data security, IoT

About Dan Matthews

Dan Matthews is a writer and content consultant from Boise, ID with a passion for tech, innovation, and thinking differently about the world. You can find him on Twitter and LinkedIn.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

The Advantages of IT Staff Augmentation Over Traditional Hiring

May 4, 2023 By Mukesh Ram

The State of Digital Asset Management in 2023

May 3, 2023 By pimcoremkt

Test Data Management – Implementation Challenges and Tools Available

May 1, 2023 By yash.mehta262

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application Artificial Intelligence BI Big Data business China Cloud Companies company crypto customers Data design development digital engineer engineering environment experience future Google+ government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Data Science at Scale
  • Statistics with Python
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 5 Reasons Why Modern Data Integration Gives You a Competitive Advantage
  • 5 Most Common Database Structures for Small Businesses
  • 6 Ways to Reduce IT Costs Through Observability
  • How is Big Data Analytics Used in Business? These 5 Use Cases Share Valuable Insights
  • How Realistic Are Self-Driving Cars?

Search

Tags

AI Amazon analysis analytics application Artificial Intelligence BI Big Data business China Cloud Companies company crypto customers Data design development digital engineer engineering environment experience future Google+ government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!