|
September 9, 2015
Home Gateways: Extinction or Evolution?
September 1, 2015
The Real Software Revolution? It’s in the Data Center
August 25, 2015
Is The Tech Market Hitting Middle Age?
August 18, 2015
Building Vertical Platforms for IOT
August 4, 2015
The IOT Monetization Problem
July 28, 2015
The Windows 10 Hardware Argument
July 21, 2015
The Complexity Challenge Drives Shadow IT
July 14, 2015
The Hidden Opportunity of Corporate Smartphones
July 7, 2015
The Analytics of IOT
June 30, 2015
IOT Momentum Starting to Build
June 23, 2015
Breaking the IOT Connection
June 16, 2015
Software is a Service
June 9, 2015
The Challenge of Rising Expectations
June 4, 2015
Insider Extra: Rethinking the Conference Room
June 2, 2015
Win10 + Intel Skylake + Thunderbolt 3 = Interesting PC
May 26, 2015
The IOT Opportunity is Wide Open
May 21, 2015
Insider Extra: The Carrier Challenge for Consumer IOT
May 19, 2015
Maker Movement Drives the Future
May 14, 2015
Insider Extra: The Next Step for Wearables: Health Care
May 12, 2015
Making Sense of IOT
May 5, 2015
A Fresh Look at Wearables
April 30, 2015
Insider Extra: The Amazing HoloLens Leap
April 28, 2015
The Device Dream Team: Large Smartphones and Thin Notebooks
April 23, 2015
Insider Extra: Mobile Sites Should Be Dead
April 21, 2015
Wearables + Connected Cars = IOT Heaven
April 14, 2015
The Future of Wearable Power Is Energy Harvesting
April 7, 2015
Twinning Is Key to Connected Devices
April 2, 2015
Insider Extra: Competing Standard Co-Existence For Wireless Charging and IOT
March 31, 2015
Riding the High-Res Tidal Wave
March 24, 2015
Smart Cars Accelerating Slowly
March 19, 2015
Insider Extra: The Future of Computing is Invisible
March 17, 2015
Smart Home Decade Dilemma
March 10, 2015
Apple Event Surprises
March 3, 2015
Flat Slab Finale?
February 26, 2015
Insider Extra: "Phablet" Impact Continues to Grow
February 24, 2015
Paying for Digital Privacy
February 19, 2015
Insider Extra: The Wire-Free PC
February 17, 2015
Whither Apple?
February 12, 2015
Insider Extra: The Real IOT Opportunity? Industry
February 10, 2015
Business Models For The Internet of Things (IOT)
February 5, 2015
Insider Extra: Is "Mobile Only" The Future?
February 3, 2015
Sexiest New Devices? PCs...
January 29, 2015
Insider Extra: iPhone Next
January 27, 2015
How Will Windows 10 Impact PCs and Tablets?
January 22, 2015
Insider Extra: Hands-On (or Heads-on) With HoloLens
January 20, 2015
Whither Windows 10?
January 15, 2015
Insider Extra: Mobile Security: The Key to a Successful BYOD Implementation
January 13, 2015
Smart Home Situation Likely To Get Worse Before It Gets Better
January 6, 2015
More Tech Predictions for 2015
December 30, 2014
Top 5 Tech Predictions for 2015
|
|
|
|
September 15, 2015
By Bob O'Donnell
The potential opportunities within the Internet of Things (IOT) continue to be at the forefront of many people’s minds. But lurking in the back corners of those same minds are concerns about the potential security nightmares of a fully connected world.
Even barring the crazy Skynet scenarios from The Terminator, there are plenty of good reasons to be concerned about the hyper-connectedness of IOT, as I’ve written about in the past. In fact, the possibility of security-based issues creating problems is one of the key reasons I believe it will be a very, very long time before we see widespread use of fully autonomous automobiles on our roads.
We’ll certainly see lots of great developments in smarter cars that have collision avoidance features and other automated safety improvements, but that’s still a big difference from being fully autonomous. In other areas, we’ll likely see similar types of adjustments that reflect concerns around the potential for insecure connections.
To be sure, the move toward greater connectivity across multiple devices continues to gain momentum, and it’s arguably an unstoppable force at this point. Nevertheless, conscientious efforts to modestly slow, or perhaps refocus or reshape some of these developments around a security-based paradigm, is going to be critically important for the long-term success of IOT.
One way of doing that is by looking at some of the essential ways to drive a more secure IOT environment. I believe one of the key solutions is going to be leveraging hardware-based security models—think embedded tokens, device IDs or secure elements that can uniquely identify a given device on a network.
By establishing a root of trust on a device, a secure embedded element can help the device and any embedded operating system on it assure that they “are” who they think they are, and also ensure that no changes have been made to any firmware or boot code on the device. Though admittedly very technical, this is a key element in maintaining the security of a single device.
Even more importantly, however, a hardware-based security element can also be used to identify and authenticate a device on a network. At a simplistic level, this is actually how SIM cards work with carrier networks—they identify your phone to the network, assuring that the phone can function and that your phone’s number/identity is who it says it is.
Of course, the concept of an embedded hardware element and the reality of its implementation can be two different things. Long-time industry observers may recall the brouhaha that Intel created many years back when it tried to put CPU IDs into its processors.
Times have changed, however, and the security breaches that bombard us in the news every day have likely changed the minds of individuals who may have had concerns about these technologies in the past. Plus, the highly networked nature of all our devices makes the issue more pressing now than it ever has been.
There are now a significantly larger number of companies (and devices) involved in trying to solve these issues. Everyone from SIM card makers like Gemalto to CPU vendors like Intel to IP licensing companies like ARM, Imagination Technologies, Synopsys and others are working to create different types of device ID “card” equivalents that can be used to piece together a more secure environment for IOT.
Just as one type of key won’t work on all types of locks, there’s still a lot of hard work to ensure that the different types of secure IDs and different security protocols and authentication methods can talk to one another. But software alone can’t solve the challenges of IOT security—it’s still going to take some hardware to make digital security keys really work.
Here's a link to the original column: https://techpinions.com/the-key-to-iot-security/41796
Podcasts
Leveraging more than 10 years of award-winning, professional radio experience, TECHnalysis Research participates in a video-based podcast called Everything Technology.
LEARN MORE |
|
Research Offerings
TECHnalysis Research offers a wide range of research deliverables that you can read about here.
READ MORE |
|