How an SDSN con­trolled vi­sion can lead IoT to se­cure fu­ture

SDSN plat­forms can en­able net­work op­er­a­tors and ser­vice ven­dors to man­age their se­cu­rity mech­a­nisms as a uni­fied threat de­tec­tion sys­tem. It places the net­work at the cen­ter of a mas­sive se­cu­rity in­fras­truc­ture, which pro­vides sim­plic­ity and flex­i­bil­ity t

Dataquest - - CONTENTS - (The au­thor Di­rec­tor, Sys­tems Engi­neer­ing – In­dia & SAARC, Ju­niper Net­works)

The In­ter­net of Things (IoT) has been the talk of the tech­nol­ogy world for a few years now. It has gen­er­ated plenty of in­no­va­tion and at­ten­tion, but its rate of mass adop­tion has per­haps not been as wide­spread as many ex­pected. While the vi­sion of IoT re­mains the same, ei­ther the mar­ket or the in­fras­truc­ture is not yet ready to en­able its mas­sive adop­tion.

None­the­less, home own­ers and en­ter­prises who do not adopt IoT soon will fall be­hind the curve when it does catch on. De­spite this so- called ‘ slow adop­tion’, 30.7 bil­lion IoT de­vices are ex­pected to be con­nected by 2020 ( there were 15.4 bil­lion in 2015).

An IoT fu­ture where AI as­sis­tants can sim­ply be at­tached to any ob­ject and con­nect it to the IoT is not far away. On a much larger scale, IoT can also en­able gov­er­nance of mas­sive trans­porta­tion and man­u­fac­tur­ing ecosys­tems that are de­signed for the 21st cen­tury. In­dus­try 4.0 and fac­to­ries of the fu­ture are al­ready here, and they run on IoT. Man­ag­ing in­dus­trial and con­sumer IoT though, is eas­ier said than done, and re­quires tremen­dous in­vest­ment be­hind the scenes.

Ad­di­tion­ally, IoT is also pre­par­ing the world for a fu­ture of ‘Dig­i­tal Co­he­sion’ where au­to­mated mega-ser­vices adapt to in­di­vid­ual user be­hav­ior and en­rich per­sonal

and busi­ness lives. In this fu­ture, busi­nesses get in­creased pro­duc­tiv­ity, bud­get ef­fi­ciency, work­force man­age­ment mod­els and busi­ness ser­vice in­no­va­tions. Con­sumers get bet­ter com­mu­nity in­fras­truc­ture, ef­fi­cient use of per­sonal time, im­proved ed­u­ca­tion and learn­ing ca­pa­bil­i­ties and lower liv­ing costs.


With bil­lions of con­nected de­vices work­ing si­mul­ta­ne­ously on the IoT, col­lab­o­ra­tion and syn­chro­niza­tion between var­ied net­work el­e­ments is cru­cial. Some of the key chal­lenges that plague IoT adop­tion are: Too much data to an­a­lyze Dif­fi­cult to cap­ture use­ful data Anal­y­sis tools aren’t flex­i­ble or ad­vanced enough Ven­dors don’t know what ques­tions to ask Data anal­y­sis is too slow to have ac­tion­able out­comes How­ever, most ser­vice ven­dors still over­look gap­ing se­cu­rity holes that leave them vul­ner­a­ble. Since the very na­ture of IoT is highly net­work de­pen­dent, its im­ple­men­ta­tion opens a whole new at­tack vec­tor that needs to be pro­tected. Cy­ber­crime is a large-scale or­ga­nized busi­ness that fetches at­tack­ers more than $2 tril­lion a year, which is more than the GDP of coun­tries such as Rus­sia, Aus­tralia or Switzer­land. Thus, net­work se­cu­rity is very im­por­tant since a net­work is only as se­cure as its weak­est link.\

Un­for­tu­nately, IoT cre­ates sev­eral weak links that can be ex­ploited. Net­work op­er­a­tors are thus forced to deal with com­pli­cated in­fras­truc­ture with an agility that keeps up with at­tack­ers from around the world. It is sim­ply un­fea­si­ble to man­u­ally man­age se­cu­rity pol­icy changes or up­grades in such a volatile and vul­ner­a­ble en­vi­ron­ment.


This sit­u­a­tion de­mands an ap­proach that not only sim­pli­fies ex­ist­ing se­cu­rity stacks, but also grants net­work op­er­a­tors a plat­form that works on au­to­ma­tion, ma­chine learn­ing and IoT-en­abled in­tel­li­gence. The so­lu­tion here is a uni­fied cy­ber­se­cu­rity plat­form that is pow­ered by a Soft­ware-De­fined Se­cure Net­work (SDSN).

SDSN plat­forms can en­able net­work op­er­a­tors and ser­vice ven­dors to man­age their se­cu­rity mech­a­nisms as a uni­fied threat de­tec­tion sys­tem. It places the net­work at the cen­ter of a mas­sive se­cu­rity in­fras­truc­ture, which pro­vides sim­plic­ity and flex­i­bil­ity to se­cure mil­lions of IoTen­abled de­vices across ge­ogra­phies.

It is not far-fetched to imag­ine that SDSN can pro­vide the much-needed boost that drives IoT adop­tion. By seam­lessly man­ag­ing the sub­stan­tial num­ber of IoT de­vices and the data gen­er­ated by them, and by re­mov­ing the pos­si­bil­ity of se­cu­rity breaches driven by in­ad­e­quate man­ual traf­fic hair-pin­ning, SDSN can of­fer safe pas­sage into the age of au­to­ma­tion. It can make a mas­sive dif­fer­ence by func­tion­ing be­hind the scenes and ef­fi­ciently con­duct­ing com­pute and net­work func­tions for IoT de­vices.

By de­ploy­ing SDSN so­lu­tions, man­u­fac­tur­ers can build se­cu­rity in­fras­truc­ture that is sim­ple to man­age, and which of­fers trans­par­ent threat vis­i­bil­ity. This in­fras­truc­ture can pro­vide ad­vanced threat in­tel­li­gence, cre­ate a syn­er­gis­tic ap­proach that cen­tral­izes a multi-ven­dor ecosys­tem, and en­able IoT busi­nesses to se­cure their net­works as they un­dergo mas­sive trans­for­ma­tion.


A con­nected fu­ture that is fu­eled by IoT of­fers great prom­ise and op­por­tu­nity for ev­ery­one. Un­for­tu­nately, as more de­vices get con­nected to peo­ple and to each other, the more lu­cra­tive it be­comes for at­tack­ers to in­fil­trate lives. More IoT de­vices sim­ply open the po­ten­tial of more at­tacks. As ma­li­cious at­tacks be­come more ad­vanced and fre­quent than ever be­fore, SDSN can of­fer a so­lu­tion that guar­an­tees se­cu­rity in the IoT era.

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.