Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings

The Internet of Things— it’s about security

By Leslie Langnau | June 9, 2016

Share

The IoT juggernaut continues: Forecasters like Gartner Research predict that the typical home will have nearly 500 networked devices by 2020 (not me; I’m still wondering why bother?). Big name companies like GE and Siemens pitch their IoT successes at various conferences.

The much-hyped Internet of Things concept promises to tackle common problems: such as the complexities of managing product life cycles and the lack of interoperability between information technology and “operational technology.” (Back in my day, operational technology (OT) was better known as industrial control, as in PLCs, SCADA systems, CNCs, and so on.)

One concern, however, is bubbling up to the top—how will all the gathered data be secured from hackers?

According to a report from Argus Insights, the conversation is shifting from what cool things can we connect to the IoT, to how do we secure all the data? In fact, security is becoming more of a concern than privacy, as well it should. Privacy implies a user has control over when and how data are shared. Security says a user doesn’t.

“Security concerns for consumers are definitely on the rise and this goes double for any enterprise deployments. Security issues are a real roadblock for IoT product acceptance,” said John Feland, CEO, Argus Insights.

Unfortunately, tested, viable security solutions are scarce. Typical solutions like a secure boot or encrypted connection only cover a few vulnerabilities.

Noted the Argus Insights report, the lack of good security software approaches among software vendors “forces engineers to integrate a confusing array of components from many sources only to find they do not play well together or impose an unwieldy demand on scarce system resources.”

This is a problem.

The unpopular reality is that we don’t really understand how to secure devices; this is new territory.

At the recent Disrupt New York 2016 conference, experts weighed in. The best way to lock down data is to not have access to it in the first place suggested Nate Cardoza, an attorney for the Electronic Frontier Foundation.

If you collect data, interested parties, such as hackers, organized crime, law enforcement (the recent FBI request to Apple, for example) and others will want access to it. Guaranteed.

So some are suggesting a zero knowledge model, where vendors (example: Apple) don’t have access to the data. As engineers and vendors navigate security, this model may become the preferred approach.

The bigger question, though, may be: Why are we networking everything? What, exactly, is the point? In some situations, the data may be useful. But everything? Just because we can? That’s sloppy thinking.

But vendors will continue to explore anything that can be connected to the internet. Martin Mickos, CEO of security firm HackerOne, has a suggestion for better security. In your design, shift to the open source model where you can invite others to help find vulnerabilities. That’s an interesting approach.

LLangnauAt the heart of the IoT concept is the idea that technology will solve all of our problems. If we just have enough data, we can figure it all out. What if that concept is backwards? What if it’s people, in the form of a “neighborhood watch,” rather than technology, that is the best way to ensure security?

Leslie Langnau – Managing Editor
[email protected]ia.com
On Twitter @DW_3Dprinting


Filed Under: Commentary • expert insight

 

Comments

  1. Carl Selby says

    June 20, 2016 at 5:30 am

    There is a company called Device Authority (I do not work for them!) who purports to have the solution. A mix of patented device authentication and end-to-end encryption. They are a 2015 and 2016 Gartner Cool Vendor and have just won title of UKs most innovative SME, awarded by the British Government.

Tell Us What You Think!

Related Articles Read More >

china-manufacturing-future-image
Is China’s manufacturing future in trouble?
hiring engineers
The real reason for hiring engineers
TriStar, a misunderstood failure of design
More on engineering and science

DESIGN GUIDE LIBRARY

“motion

Enews Sign Up

Motion Control Classroom

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Global supply needs drive increased manufacturing footprint development
  • How to Increase Rotational Capacity for a Retaining Ring
  • Cordis high resolution electronic proportional pressure controls
  • WAGO’s custom designed interface wiring system making industrial applications easier
  • 10 Reasons to Specify Valve Manifolds
  • Case study: How a 3D-printed tool saved thousands of hours and dollars

Design World Podcasts

May 17, 2022
Another view on additive and the aerospace industry
See More >
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • Advertising
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Engineering White Papers
  • LEAP AWARDS

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings