Khaleej Times

Tread with caution on the Internet of Things

- Tim STevenS WIRED WORLD

We all know personal devices can be hacked, but a whole country’s security could be at risk, too. With the rise of the socalled Internet of Things (IoT), and against the backdrop of cyberwarfa­re, digital surveillan­ce and subversion, the risk to national security is increasing. Earlier this year, the head of the UK National Cyber Security Centre publicly stated that a major cyber-attack on the country’s essential services was a question of “when, not if ”.

The IoT comprises of the billions of online objects embedded in our homes, workplaces and cities, that are constantly collecting, analysing and transmitti­ng data. Some IoT devices, such as personal fitness trackers or smartphone­s, are carried with us wherever we go. Others we interact with remotely, such as domestic heating controls. Many are invisible, operating silently to modulate traffic flows, industrial control systems, and much more.

IoT devices are not so much things with computers in them, but computers with things attached to them. Because no computer is perfectly secure, that means that neither is your smart fridge or your virtual assistant. Like all things online, these objects form part of massively distribute­d networks. If someone wanted to hack into these global informatio­n networks, IoT devices provide billions of extra entry points. It is relatively easy to hack an IoT device, as many cheap products do not have adequate security. Even devices with advanced security, such as driverless cars, are vulnerable. This means that IoT technologi­es are widely regarded as a major cyber-security problem. Pacemakers being hacked, air traffic control systems going down, and all out “cyber-war” are just some worst case scenarios.

Cyber-attacks on critical national infrastruc­ture are already a very real threat. In 2015, the Ukranian power grid was affected by a cyber-attack that left Kiev without electricit­y for several hours. In 2017, the UK’s NHS was compromise­d for weeks due to the malicious software WannaCry.

These incidents show just how disruptive cyber-attacks can be and the fact that IoT attacks are proliferat­ing and diversifyi­ng is a cause to worry. One major internet security company reported that IoT attacks increased 600 per cent in 2016-17. This is an exponentia­l rise and is expected to persist, not least as the number of IoT devices increase. Devices already outnumbere­d humans in 2017 but may top 20 billion by 2020.

A botnet is a network of internet connected devices that have been hacked, hijacked and controlled remotely. The problem is that poorly secured IoT accounts make perfect targets for hackers attempting to develop and weaponise botnets. With the right malware, hackers can use botnets to perform distribute­d denial-of-service (DDoS) attacks against specific targets. The malware uses thousands of devices to flood internet servers with traffic and disable access to online resources. Billions of IoT devices make it easier for hackers to take control of large botnets and attack even the most robust targets.

The Mirai malware exploited vulnerabil­ities in IoT devices, such as CCTV cameras and routers, to do just this. In October 2016, Mirai launched a DDoS against Dyn, Inc, the company that provides access to major platforms like Twitter, Amazon and Netflix. The DDoS prevented consumers from accessing these platforms for several hours. Of course, it is difficult to calculate the financial implicatio­ns of such incidents but Mirai showed how essential services can be attacked by exploiting IoT devices. States or non-state actors could try and use an IoT botnet to attack a country’s health, energy, transport or finance sector. If a botnet were directed against critical national infrastruc­ture, the effects could be severe. Speculatio­n in the absence of evidence is rarely wise but it is not hard to imagine what might happen if financial services were taken offline, or rail transport networks sabotaged. No cyber-attack has yet collapsed the global financial system, or killed anyone, thankfully, but these are the fears of policymake­rs and cyber-security profession­als.

Attributio­n is not easy either but it’s getting better. Were a state or terrorist group identified as the perpetrato­r of a major attack, national security apparatuse­s should swing into action to counter them. For Nato members, a cyberattac­k might even trigger a collective political and military response.

So far, both the US and the UK have stopped short of introducin­g regulation, but instead are putting pressure on businesses to make their products more secure. However, these policies do not address the overarchin­g problem: companies will keep on selling products with poor security because consumers are

This is a “wicked problem”. Even if a solution was obvious, it would likely be impossible due to key players’ motives.

willing to buy them. It is supply and demand. There are presently few incentives for firms to bring IoT products to market that meet high security standards. In global supply chains, the picture is even more complicate­d because national initiative­s cannot resolve transnatio­nal problems.

The market will not solve this problem, so more robust government regulation are all but inevitable. Few bureaucrac­ies relish the challenge. In policy terms, this is a “wicked problem”. Even if a solution was obvious, it would likely be impossible due to key players’ competing motives and the dynamism of the technical environmen­t. A more radical approach is to address why the IoT exists in the first place. It is the product of both laudable aims (energy efficiency, public welfare) and an obsession with connectivi­ty for connectivi­ty’s sake. As is well-establishe­d, complex systems generate unpredicta­ble effects. If we are to minimise the risks of wiring up our world, we need to consider prioritisi­ng devices that are truly necessary over ones that are simply desirable. This will require a fundamenta­l shift in mindset, putting the public good before profit and political expediency. —The Conversati­on

Tim Stevens is Lecturer in Global Security at King’s College London

 ??  ??

Newspapers in English

Newspapers from United Arab Emirates