Technalysis Research
 
Previous Blogs

September 9, 2015
Home Gateways: Extinction or Evolution?

September 1, 2015
The Real Software Revolution? It’s in the Data Center

August 25, 2015
Is The Tech Market Hitting Middle Age?

August 18, 2015
Building Vertical Platforms for IOT

August 4, 2015
The IOT Monetization Problem

July 28, 2015
The Windows 10 Hardware Argument

July 21, 2015
The Complexity Challenge Drives Shadow IT

July 14, 2015
The Hidden Opportunity of Corporate Smartphones

July 7, 2015
The Analytics of IOT

June 30, 2015
IOT Momentum Starting to Build

June 23, 2015
Breaking the IOT Connection

June 16, 2015
Software is a Service

June 9, 2015
The Challenge of Rising Expectations

June 4, 2015
Insider Extra: Rethinking the Conference Room

June 2, 2015
Win10 + Intel Skylake + Thunderbolt 3 = Interesting PC

May 26, 2015
The IOT Opportunity is Wide Open

May 21, 2015
Insider Extra: The Carrier Challenge for Consumer IOT

May 19, 2015
Maker Movement Drives the Future

May 14, 2015
Insider Extra: The Next Step for Wearables: Health Care

May 12, 2015
Making Sense of IOT

May 5, 2015
A Fresh Look at Wearables

April 30, 2015
Insider Extra: The Amazing HoloLens Leap

April 28, 2015
The Device Dream Team: Large Smartphones and Thin Notebooks

April 23, 2015
Insider Extra: Mobile Sites Should Be Dead

April 21, 2015
Wearables + Connected Cars = IOT Heaven

April 14, 2015
The Future of Wearable Power Is Energy Harvesting

April 7, 2015
Twinning Is Key to Connected Devices

April 2, 2015
Insider Extra: Competing Standard Co-Existence For Wireless Charging and IOT

March 31, 2015
Riding the High-Res Tidal Wave

March 24, 2015
Smart Cars Accelerating Slowly

March 19, 2015
Insider Extra: The Future of Computing is Invisible

March 17, 2015
Smart Home Decade Dilemma

March 10, 2015
Apple Event Surprises

March 3, 2015
Flat Slab Finale?

February 26, 2015
Insider Extra: "Phablet" Impact Continues to Grow

February 24, 2015
Paying for Digital Privacy

February 19, 2015
Insider Extra: The Wire-Free PC

February 17, 2015
Whither Apple?

February 12, 2015
Insider Extra: The Real IOT Opportunity? Industry

February 10, 2015
Business Models For The Internet of Things (IOT)

February 5, 2015
Insider Extra: Is "Mobile Only" The Future?

February 3, 2015
Sexiest New Devices? PCs...

January 29, 2015
Insider Extra: iPhone Next

January 27, 2015
How Will Windows 10 Impact PCs and Tablets?

January 22, 2015
Insider Extra: Hands-On (or Heads-on) With HoloLens

January 20, 2015
Whither Windows 10?

January 15, 2015
Insider Extra: Mobile Security: The Key to a Successful BYOD Implementation

January 13, 2015
Smart Home Situation Likely To Get Worse Before It Gets Better

January 6, 2015
More Tech Predictions for 2015

December 30, 2014
Top 5 Tech Predictions for 2015

2014 Blogs


2013 Blogs

















TECHnalysis Research Blog

September 15, 2015
The Key to IOT Security

By Bob O'Donnell

The potential opportunities within the Internet of Things (IOT) continue to be at the forefront of many people’s minds. But lurking in the back corners of those same minds are concerns about the potential security nightmares of a fully connected world.

Even barring the crazy Skynet scenarios from The Terminator, there are plenty of good reasons to be concerned about the hyper-connectedness of IOT, as I’ve written about in the past. In fact, the possibility of security-based issues creating problems is one of the key reasons I believe it will be a very, very long time before we see widespread use of fully autonomous automobiles on our roads.

We’ll certainly see lots of great developments in smarter cars that have collision avoidance features and other automated safety improvements, but that’s still a big difference from being fully autonomous. In other areas, we’ll likely see similar types of adjustments that reflect concerns around the potential for insecure connections.

To be sure, the move toward greater connectivity across multiple devices continues to gain momentum, and it’s arguably an unstoppable force at this point. Nevertheless, conscientious efforts to modestly slow, or perhaps refocus or reshape some of these developments around a security-based paradigm, is going to be critically important for the long-term success of IOT.

One way of doing that is by looking at some of the essential ways to drive a more secure IOT environment. I believe one of the key solutions is going to be leveraging hardware-based security models—think embedded tokens, device IDs or secure elements that can uniquely identify a given device on a network.

By establishing a root of trust on a device, a secure embedded element can help the device and any embedded operating system on it assure that they “are” who they think they are, and also ensure that no changes have been made to any firmware or boot code on the device. Though admittedly very technical, this is a key element in maintaining the security of a single device.

Even more importantly, however, a hardware-based security element can also be used to identify and authenticate a device on a network. At a simplistic level, this is actually how SIM cards work with carrier networks—they identify your phone to the network, assuring that the phone can function and that your phone’s number/identity is who it says it is.

Of course, the concept of an embedded hardware element and the reality of its implementation can be two different things. Long-time industry observers may recall the brouhaha that Intel created many years back when it tried to put CPU IDs into its processors.

Times have changed, however, and the security breaches that bombard us in the news every day have likely changed the minds of individuals who may have had concerns about these technologies in the past. Plus, the highly networked nature of all our devices makes the issue more pressing now than it ever has been.

There are now a significantly larger number of companies (and devices) involved in trying to solve these issues. Everyone from SIM card makers like Gemalto to CPU vendors like Intel to IP licensing companies like ARM, Imagination Technologies, Synopsys and others are working to create different types of device ID “card” equivalents that can be used to piece together a more secure environment for IOT.

Just as one type of key won’t work on all types of locks, there’s still a lot of hard work to ensure that the different types of secure IDs and different security protocols and authentication methods can talk to one another. But software alone can’t solve the challenges of IOT security—it’s still going to take some hardware to make digital security keys really work.

Here's a link to the original column: https://techpinions.com/the-key-to-iot-security/41796

Podcasts
Leveraging more than 10 years of award-winning, professional radio experience, TECHnalysis Research participates in a video-based podcast called Everything Technology.
LEARN MORE
  Research Offerings
TECHnalysis Research offers a wide range of research deliverables that you can read about here.
READ MORE