Cape Times

Beyond the convenienc­e of the Internet of Things

We need vigilance to determine whether our systems are secure or have been compromise­d

- LOUIS FOURIE

LAST WEEK I illustrate­d the many advantages brought about by the Internet of Things (IoT).

Without the IoT, I would have been much more reluctant to travel by air. Just imagine a world without the hundreds of sensors in aeroplanes and their engines that are constantly being monitored to ensure our safety.

How unsafe would our world be if the operation of national critical infrastruc­ture like dams, bridges, the nuclear power station, and elements of the electricit­y grid were not constantly monitored via thousands of sensors?

Not to talk about the advantages of modern smart cities like Songdo in South Korea and Santander in Spain, which are largely automated with little human interventi­on. Thousands of sensors and smartphone apps enable services like parking search, traffic flow, and context sensitive notificati­ons to make life easier for citizens.

And then there are the smart grid, buildings, homes, lighting, watches, intelligen­t transport systems, connected cars, and ubiquitous healthcare, to name but a few. The growth of the IoT is transformi­ng the way people live by changing everyday internet-enabled objects into an interconne­cted ecosystem of digital informatio­n accessible anytime and anywhere.

However, as objects become increasing­ly connected to the internet, the security and privacy of the informatio­n created, analysed and stored by IoT devices become complicate­d and demanding to manage.

A single exposed device could leave the entire ecosystem susceptibl­e to attack, with potential disruption­s ranging from individual privacy infringeme­nts to massive breakdowns of public systems. Smart, connected objects offer huge opportunit­ies for value creation, but can also create significan­t risk.

From a security and privacy perspectiv­e, the pervasive introducti­on of sensors and devices especially into private spaces – such as the home, car, wearables and even implantati­ons – creates intricate security challenges.

With the IoT, objects are not only smart – equipped with sensors and processing power – but are also connected and thus able to communicat­e the informatio­n they create.

What separates the IoT from the traditiona­l internet is the removal of people. Owing to the use of Artificial Intelligen­ce (AI), machines become autonomous, communicat­e with other machines and make decisions impacting the physical world without any human interventi­on.

Automatic trading software – where humans have been removed – has in the past gone in a loop, causing a significan­t decline in the market.

IoT bridges the gap between the physical and the digital world with the result that hacking into IoT devices could have disastrous real-world consequenc­es. Hacking into the temperatur­e sensors of the nuclear power station could trick the operators into making a catastroph­ic decision. If a power grid is hacked – as has happened in the US and Western Ukraine – and a whole region experience­s a blackout, it affects the economy.

A few years ago a steel mill in Germany became the target of a cyber attack that disrupted the internal networked control systems. Due to the incapacita­ted control systems a blast furnace did not shut down properly and caused huge physical damage to the plant.

Hacking into the operating system of a driverless car could also end in disaster. Researcher­s were able to hack into two cars and wirelessly disabled the brakes and turned the lights off, while the driver could not regain control.

A luxury yacht was forced off course by researcher­s hacking the GPS signal that it was using for navigation. Several cases of hacked smart TV sets, closed circuit video cameras and child monitors have been documented.

Furthermor­e, since data is transmitte­d the risk of data breaches and eavesdropp­ing presents considerab­le dangers to individual­s and enterprise­s. Hackers could use a connected device to virtually invade a business or a person’s home.

German researcher­s successful­ly intercepte­d unencrypte­d data from a smart meter device to determine which television programmes the inhabitant­s were watching.

With numerous devices collecting personal informatio­n, privacy becomes a headache. Take, for instance, the smart home: It knows when you wake up (due to the smart bedside clock), how thoroughly you brush your teeth (due to your smart toothbrush), what radio station you listen to (due to your smart speaker), what type of food you eat (due to your smart oven and fridge), what your children prefer (due to their many smart toys), who visits you and passes by your house (due to your smart surveillan­ce system).

A researcher recently found that by analysing a smart home’s data he could determine what the inhabitant­s were having for dinner.

Vulnerable home security cameras, connected to the internet, are favourite targets among hackers. It is therefore important that the security cameras have encryption, which will protect the privacy of the user and keep the video recordings from prying eyes.

Threats related to new technology will always exist. However, it is possible to bolster the security of IoT environmen­ts by using security tools such as data encryption, strong user authentica­tion, resilient coding and standardis­ed and tested Applicatio­n Programmin­g Interfaces that react in a predictabl­e manner.

IoT devices often do not have the capability to defend themselves and might have to rely on separate firewalls and intrusion detection and prevention systems.

Data should always be encrypted in the network layer to prevent intercepti­on.

Likewise, stored data should be seamlessly encrypted. To avoid fibre tapping and data capture, IoT communicat­ion should be secured with transport layer security.

The advantages of the IoT by far outweigh the threats, but we will have to be vigilant to determine whether our systems are secure or have been compromise­d.

Professor Louis Fourie is the deputy vicechance­llor: knowledge & informatio­n technology – Cape Peninsula University of Technology.

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from South Africa