Technalysis Research
 
Previous Blogs

October 25, 2016
The Indefatigable PC

October 21, 2016
Tesla Hardware Upgrade to Enable More Autonomous Cars

October 18, 2016
Can IT Survive?

October 14, 2016
Sony PlayStation VR Brings Virtual Reality to the Masses

October 11, 2016
Galaxy Note 7: The Death of a Smartphone

October 4, 2016
Service Providers Still Act Like Utilities

September 30, 2016
Google Updates Their Cloud Offerings

September 27, 2016
The Andromeda Strain

September 13, 2016
Apple's Missed Audio Opportunity

September 9, 2016
Traditional IT Companies Announce Major Changes: Dell, HP Enterprise, Intel

September 6, 2016
Rethinking Smart Home Gateways

August 30, 2016
Ridesharing Impact Dramatically Overstated

August 23, 2016
Consumer Interest in Auto Tech? Slower Than You Think

August 19, 2016
Intel Focuses on Automotive

August 16, 2016
The Utility of Cloud Computing

August 12, 2016
Intel Purchases AI Chip Vendor

August 9, 2016
The Digital Identity Dilemma

August 2, 2016
IoT Strategies Going Vertical

July 29, 2016
Yahoo-Verizon Deal

July 26, 2016
Creating New Worlds

July 19, 2016
The State of Smart Homes

July 15, 2016
US PC Market Shows Improvement

July 12, 2016
Pokemon Go is an AR Watershed

July 5, 2016
Car Wars: The Battle for Automotive Tech

July 1, 2016
Microsoft Announces Windows 10 Anniversary Update

June 28, 2016
Digital Audio Progress Highlights Tech’s More Human Future

June 24, 2016
HP Inc. Offers Thinnest Notebook

June 21, 2016
IoT Faces Challenges with Scale

June 17, 2016
Snapchat Opens Up New Options for Marketers

June 14, 2016
Apple Drives Apps into Services

June 7, 2016
The Evolution of Cloud Computing

May 31, 2016
Voice-Based Computing with Digital Assistants

May 24, 2016
Turning Makers into Manufacturers

May 20, 2016
Google Brings Android Apps to Chrome

May 17, 2016
Virtual Reality Brings New Life…to Desktops?

May 10, 2016
The Biggest Question for IoT…Who Pays?

May 3, 2016
Learning About Deep Learning

April 26, 2016
The End of Hardware?

April 19, 2016
Enterprise IoT Drives Indirect Savings

April 12, 2016
TidBits About Bots

April 5, 2016
VR in the Cloud

March 29, 2016
IOT Will Drive Tech Outside of IT

March 22, 2016
Apple Moves to Middle Age

March 15, 2016
The Invisible Platform

March 8, 2016
Bringing Makers to Business

March 1, 2016
IOT Coming Into Focus

February 23, 2016
The Devices Formerly Known as Smartphones

February 16, 2016
Can Web Music Survive?

February 9, 2016
The Growing Choices in Wireless Connectivity

February 2, 2016
What if Twitter Died?

January 26, 2016
Smart Home Safety Evolution: Physical to Digital

January 19, 2016
The Promise and Confusion of USB Type-C

January 12, 2016
The Hottest Computing Device? Cars

January 5, 2016
Top Tech Predictions for 2016, Part 2

December 30, 2015
Top Tech Predictions for 2016, Part 1

2015 Blogs

2014 Blogs


2013 Blogs

















TECHnalysis Research Blog

November 1, 2016
It’s Time for an IoT Security Standard

By Bob O'Donnell

The writing has been on the wall for some time. Worse, the recent DNS attack that brought down portions of the Internet strongly suggest that previously predicted concerns have become unpleasant realities.

The problem? Security, or the lack thereof, for the billions of things getting connected to the Internet. Unfortunately, enormous percentages of smart home security cameras, connected DVRs, industrial equipment controllers, wearables, medical equipment, cars, and many more devices are being put online with little to no security protection.

As a result, many of these devices are subject to hacking, in some cases, with potentially life-threatening results. And to make things worse, many are also vulnerable to be unwillingly overtaken and silently re-used in other types of cyber-attacks, like the DNS attack that rendered many popular web sites unreachable a little over a week ago.

This nearly complete lack of security has been talked about by some tech industry observers for years. But despite all the talk, little real action is being taken on an industry-wide basis.

Given the seriousness of the problem and its potential impact not only on our daily lives, but also on the security of critical infrastructure and even national security, it’s surprising and somewhat shocking how much inaction there has been. After all, devices that plug into the wall to get power require approval before other companies will sell them in the US, so why shouldn’t any device that gets “plugged” into the Internet require an approval process as well?

Many of the early electrical safety certification tests developed by UL (previously Underwriters Laboratories) were developed for the safety of consumers, but the impact on electrical power utilities was likely considered as well. In the exact same way, IoT security standards need to be developed both for the safety of an individual using a device, as well as the potential impact on the newest utility in our lives: the Internet.

To be fair, not all IoT security issues involve the possibility of immediate physical harm that electrically powered devices have, but some do. Plus, the potential societal disruption and associated physical threats that an IoT-driven security problem can cause could be much more widespread than any individual device could create.

Of course, the challenge of creating any kind of security standard is determining what exactly would be included and how it would be measured. Security is a significantly more complicated and nuanced topic than the spread of an electrical charge, but that doesn’t mean the effort shouldn’t be undertaken. It’s just going to take a lot more effort from more people (and companies).

Thankfully, there are several efforts being driven by individual companies to help address some of these security concerns. Chip IP company ARM, for example, whose technology is at the heart of an enormous number of IoT devices, recently added new levels of hardware security to its line of Cortex M microcontrollers. In addition, concepts like a hardware root of trust, trusted execution environments, biometric authentication and more are all being actively deployed by a variety of component and device vendors that feed into the IoT supply chain. While they won’t solve all security issues, leveraging these technologies as a starting point would seem to be a pragmatic approach.

In addition to setting those requirements, determining who administers the testing would have to be resolved. Logically, companies like UL and other members of the Nationally Recognized Testing Laboratories (NRTL) Program would be good choices. A strongly related development would also have to come from those companies who sell and/or install these types of devices. Technically, UL approval is not required to sell a device in the US, for example, but practically speaking, retailers and others who sell these devices are unwilling to accept them without some kind of approval for fear of potential insurance risks. An IoT security standard would require a similar level of support (and initial willpower) to be effective.

It’s certainly naïve to think that a single type of security standard could possibly stave off all the potential security threats that IoT devices are now raising. But it’s equally naïve to believe that nothing can or should be done about the problem. The task won’t be easy and early iterations may not be great, but it’s clear that the time has come to do something. Let’s hope some industry associations and other parts of the tech ecosystem have the guts to get an IoT security standard started and the will to stick it out.

Here's a link to the column: https://techpinions.com/its-time-for-an-iot-security-standard/47836

Bob O’Donnell is the president and chief analyst of TECHnalysis Research, LLC a market research firm that provides strategic consulting and market research services to the technology industry and professional financial community. You can follow him on Twitter @bobodtech.

Podcasts
Leveraging more than 10 years of award-winning, professional radio experience, TECHnalysis Research participates in a video-based podcast called Everything Technology.
LEARN MORE
  Research Offerings
TECHnalysis Research offers a wide range of research deliverables that you can read about here.
READ MORE