They say charity begins at home, well IoT security probably should too. The growing number of Internet enabled and connected devices we populate our homes with continues to grow year on year - yet, with each new device we connect up, the less confident we become in our home security.
The TV news and online newspapers on one-hand extol the virtues of each newly launched Internet-connected technology, yet with the other they tell the tale of how your TV is listening to you and how the animatronic doll your daughter plays with is spying on her while she sleeps.
To be honest, it amazes me that some consumer networking company hasn't been successful in solving this scary piece of IoT real estate, and to win over the hearts and minds of family IT junkies at the same time.
With practically all these IoT devices speaking over WiFi, and the remaining (lets guess at 10% of home deployments) using Zigbee, Z-Wave, Thread, or WeMo, logically a mix of current generation smart firewall, IPS, and behavioral log analytics would easily remediate well over 99% of envisaged Internet attacks these IoT devices are likely to encounter, and 90% of the remaining threats conducted from within the local network or residential airwaves.
Why is that we haven't seen a "standard" WiFi home router employing these security capabilities in a meaningful way - and marketed in a similar fashion to the Ads we see for identity protection, insurance companies, and drugs (complete with disclaimers if necessary)?
When I look at the long list of vulnerabilities disclosed weekly for all the IoT devices people are installing at home, it is rare to encounter one that either couldn't have an IPS rule constructed to protect it, or would be protected by generic attack vector rules (such as password brute forcing).
If you also included a current (i.e. 2017) generation of ML -powered log analytics and behavioral detection systems in to the home WiFi router, you could easily shut out attack and abuse vectors such as backdoor voyeurism, bitcoin mining, and stolen credential use.
Elevating home IoT security to v1.01 seems so trivial.
The technologies are available, the threat is ever present, the desire for a remedy is there, and I'd argue the money is there too. Anyone installing an app controllable light bulb, door lock, or coffee maker, has obviously already invested several hundreds of dollars in their WiFi kit, Internet cable/fiber provider, laptop(s), and cell phone(s) - so the incremental hit of $100-200 to the WiFi router unit RRP plus a $9.99 or $19.99 monthly subscription fee for IPS signatures, trained classifiers, and behavioral analysis updates, seems like a no-brainer.
You'd think that Cisco/Linksys, D-Link, Netgear, etc. would have solved this problem already... that IoT security (at home) would be "in the bag" and we'd be at v1.01 status already. Maybe market education is lagging and a focused advertising campaign centers on securing your electronic home would push market along? Or perhaps these "legacy" vendors need an upstart company to come along and replace them?
Regardless, securing IoT at home is not a technologically challenging problem. It has been solved many times with different tools within the enterprise (for many years), and the limited scope and sophistication of home networking makes the problem much easier to deal with.
I hope some intelligent security vendor can come to the fore and bring the right mix of security technology to the fore. Yes, it costs R&D effort to maintain signatures, train classifiers, and broaden behavioral detection scenarios, but even if only 1% of homes that have WiFi routers today (approximately 150 million) paid a $9.99 monthly subscription for updates - that $15m per month would be the envy of 95% of security vendors around the world.
-- Gunter
[Note to (potential) vendors that want to create such a product or add such capabilities to an existing product, I'd happily offer up my expertise, advice, and contact-book to help you along the way. I think this is a massive hole in consumer security that is waiting to be filled by an innovative company, and will gladly help where I can.]
Showing posts with label IoT. Show all posts
Showing posts with label IoT. Show all posts
Tuesday, December 19, 2017
Wednesday, December 21, 2016
Edge Computing, Fog Computing, IoT, and Securing them All
The oft used term “the Internet of Things” (IoT) has
expanded to encapsulate practically any device (or “thing”) with some modicum
of compute power that in turn can connect to another device that may or may not
be connected to the Internet. The range of products and technologies falling in
to the IoT bucket is immensely broad – ranging from household refrigerators that
can order and restock goods via Amazon, through to Smart City traffic flow
sensors that feed navigation systems to avoid jams, and even implanted heart
monitors that can send emergency updates via the patient’s smartphone to a cardiovascular
surgeon on vacation in the Maldives.
The information security community – in fact, the InfoSec
industry at large – has struggled and mostly failed to secure the “IoT”. This
does not bode well for the next evolutionary advancement of networked compute technology.
Today’s IoT security problems are caused and compounded by
some pretty hefty design limitations – ranging from power consumption, physical
size and shock resistance, environmental exposure, cost-per-unit, and the manufacturers
overall security knowledge and development capability.
The next evolutionary step is already underway – and exposes
a different kind of threat and attack surface to IoT.
As each device we use or the components we incorporate in to
our products or services become smart, there is a growing need for a “brain of
brains”. In most technology use cases, it makes no sense to have every smart device
independently connecting to the Internet and expecting a cloud-based system to
make sense of it all and to control.
It’s simply not practical for every device to use the cloud
the way smartphones do – sending everything to the cloud to be processed,
having their data stored in the cloud, and having the cloud return the processed
results back to the phone.
Consider the coming generation of automobiles. Every motor,
servo, switch, and meter within the vehicle will be independently smart –
monitoring the devices performance, configuration, optimal tuning, and fault
status. A self-driving car needs to instantaneously process this huge volume of
data from several hundred devices. Passing it to the cloud and back again just
isn’t viable. Instead the vehicle needs to handle its own processing and
storage capabilities – independent of the cloud – yet still be interconnected.
The concepts behind this shift in computing power and
intelligence are increasingly referred to as “Fog Computing”. In essence,
computing nodes closest to the collective of smart devices within a product
(e.g. a self-driving car) or environment (e.g. a product assembly line) must be
able to handle he high volumes of data and velocity of data generation, and
provide services that standardize, correlate, reduce, and control the data
elements that will be passed to the cloud. These smart(er) aggregation points
are in turn referred to as “Fog Nodes”.
![]() |
Source: Cisco |
Evolutionary, this means that computing power is shifting to
the edges of the network. Centralization of computing resources and processing within
the Cloud revolutionized the Information Technology industry. “Edge Computing”
is the next advancement – and it’s already underway.
If the InfoSec industry has been so unsuccessful in securing
the IoT, what is the probability it will be more successful with Fog Computing
and eventually Edge Computing paradigms?
My expectation is that securing Fog and Edge computing
environments will actual be simpler, and many of the problems with IoT will
likely be overcome as the insecure devices themselves become subsumed in the
Fog.
A limitation of securing the IoT has been the processing
power of the embedded computing system within the device. As these devices
begin to report in and communicate through aggregation nodes, I anticipate those
nodes to have substantially more computing power and will be capable of
performing securing and validating the communications of all the dumb-smart devices.
As computing power shifts to the edge of the network, so too
will security.
Over the years corporate computing needs have shifted from
centralized mainframes, to distributed workstations, to centralized and public
cloud, and next into decentralized Edge Computing. Security technologies and
threat analytics have followed a parallel path. While the InfoSec industry has
failed to secure the millions upon millions of IoT devices already deployed,
the cure likely lies in the more powerful Fog Nodes and smart edges of the
network that do have the compute power necessary to analyze threats and mitigate
them.
That all said, Edge Computing also means that there will be
an entirely new class of device isolated and exposed to attack. These edge
devices will not only have to protect the less-smart devices they proxy control
for, but will have to be able to protect themselves too.
Nobody ever said the life of an InfoSec professional was
dull.
Subscribe to:
Posts (Atom)