Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    How to Fix the Many IoT Security Gaps That Nobody Is Thinking About

    Written by

    Wayne Rash
    Published September 12, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      It’s impossible to state accurately just how many devices are connected to the Internet. For one thing, the number changes by the minute as connections grow. For another, many if not most of those devices work quietly in the shadows simply doing their jobs and not attracting attention.

      On my three-hour drive from my office near Washington to another office quietly nestled near the James River in central Virginia, I tried to keep track of just how many of those connected things I found along US Route 29, the primary highway in that area.

      I was able to spot a few of them, but I know I missed thousands of connected things, either because they’re not readily visible or more likely because I was dodging crazed drivers. But I was able to see some of them, even if I gave up counting.

      What were those things? Everything from sensors along the Norfolk Southern railway line that parallels the highway to traffic sensors embedded in the pavement.

      There were water-level sensors near the stream beds next to bridges I passed over, monitoring devices on pipelines and agricultural equipment, and sensors in Virginia’s wineries that lie quietly in those mountain valleys a distance from the highway. And, of course, they were in gas stations and stores, on tractor trailers and in shipping containers.

      As my colleague Todd Weiss pointed out in his story, many such devices communicate via satellite, while others use everything from wireless networks to Bluetooth and WiFi. In a vast percentage of these devices, there is no security.

      In fact, many of the sensors—such as those that measure water levels or count rail cars—have been in place for decades, their only communication being an occasional burst of radio communications to an unseen server.

      Nobody really knows for sure how many such Internet of things (IoT) devices are connected and communicating at any given time. Estimates by Cisco suggest that the total in 2015 may reach over 10 billion. By 2016, some estimates suggest that there may be more connected devices than there are people on Earth. Only a few high-profile devices have any security at all.

      Those high-profile devices, including some Chrysler Jeeps that have been famously taken over by hackers, are getting attention because the results are so dramatic. Others, because the potential for harm is obvious, such as with point-of-sale devices, are starting to see some attention. But for most of the other devices, it’s business as usual.

      In many cases, security is probably not necessary. After all, there’s not much point in hacking a connected rain gauge, since rain isn’t a big secret. But what about other devices such as pipeline sensors? Those are devices that monitor the flow of whatever is being carried in the pipeline.

      How to Fix the Many IoT Security Gaps That Nobody Is Thinking About

      Sometimes it’s water or sewage; sometimes it’s natural gas or petroleum. It doesn’t take much to understand the importance of a gas or petroleum pipeline, nor the catastrophe that could happen if the sensors are hacked right before someone attacks that pipeline.

      As the September 2010 explosion of a high-pressure gas pipeline in San Bruno, Calif., demonstrated, such a catastrophe is indeed possible. While there’s no indication that tampering with sensors was an issue in that disaster, it demonstrates that there’s reason enough to protect such sensors and the data they provide.

      While it’s likely to be nearly impossible to simply add security to existing sensors and controllers that make up this part of the IoT, perhaps it’s possible to begin with a more measured approach. Clearly some of those things are reporting on critical infrastructure and should be upgraded as quickly as possible. That is already a tough job, but probably not impossible since these devices need routine servicing anyway. Perhaps when they’re visited for service, the communications modules can be upgraded.

      Other devices that normally aren’t considered part of the critical infrastructure may also need a look, such as controllers for traffic lights and embedded sensors in highways. One way to shut down a large city, after all, is to simply turn the traffic lights red—an approach that’s already been used in a couple of thrillers. While there are workarounds for that, including the time-honored approach of treating a broken traffic light as a stop sign, we all know how well that works in real life.

      But again, while it’s probably impossible for cash-strapped local governments to replace their traffic light controllers all at once, perhaps it’s not so hard to upgrade them over time as they need routine service.

      I can’t list all of the possible ways that the IoT could be turned against society. There isn’t space and besides most of it doesn’t apply to most of you who are reading this. But what does matter is the need for awareness of this issue.

      Ask yourself what part of the IoT impacts your job. Then ask yourself how you can approach the security of the things that have an impact. Can you talk to your IT manager? Your factory floor supervisor? Your safety officer? Perhaps just asking the question is enough to start the process.

      And if your job isn’t impacted by any part of the IoT, then perhaps your life outside of work is. Maybe it’s time to start calling your state legislator or your local mayor about security of the traffic sensors. It doesn’t matter what part of the IoT you help secure. Eventually, every part will need some attention. What matters is that it starts somewhere.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×