IoT Security May Not Be as Hard as You Think

Be aware: IoT applications are at risk, and you need to do something about it.

Charles Murray

April 8, 2019

3 Min Read
IoT Security May Not Be as Hard as You Think

Data and intellectual property are at risk in virtually every Internet of Things (IoT) project, but it needn’t be so, an expert will tell attendees at the upcoming Embedded Systems Conference in Boston.

Shawn Prestridge, US field applications engineering team leader for IAR Systems, will say that engineering teams often underestimate the risk of intrusion, while overestimating the difficulty of installing preventative measures. “They think that security is either too hard or too expensive,” Prestridge told Design News. “We want them to know that there are tools out there to make it easy.”

Prestridge said that the ingenuity of thieves can run the gamut. Some, he said, simply use positions of trust to make copies of intellectual property, while others find amazing ways to hack into private networks. He cited an example of data thieves in Las Vegas who gained access to a secure Wi-Fi network through a thermostat in a fish tank on a casino floor. The thieves eventually downloaded a list of the casino’s high-rolling customers, then published it on the Internet.

01-Prestridge_IAR_1.jpg

Shawn Prestridge of IAR Systems: “They think that security is either too hard or too expensive.” (Image source: IAR Systems)

People will do it just because they can,” Prestridge said. “Then they’ll figure out what to do with the data later. And by the time you figure it out, the horse has already left the barn.”

Prestridge divides the security breaches into two categories. The first is intellectual property – theft of product software and algorithms, often by overseas manufacturers authorized to produce a company’s device in a distant locale. Those thieves sometimes over-produce the product and simply re-sell it, he said. “Whenever someone comes up with a hot new idea for the IoT, it’s not very long before someone else starts copying it,” Prestridge said. The second type of security breach is theft of data off a device, or theft of data as it’s being transmitted.

Either way, such theft is preventable, Prestridge told us. Using a security development environment called Embedded Trust, engineers can employ a certificate builder that lets them control limits on manufacturing, thus enabling product developers to protect IP. They can also leverage the secure hardware built into next-generation microcontrollers for IoT solutions, limit the number of people with access to application security, and encrypt applications to deter hackers.

At the session, titled How to Secure Your IoT Project, Prestridge will also discuss General Data Protection Regulations in Europe and pending legislation in the US that would affect IoT security. In addition, he will address ways for developers to be compliant with that legislation.

Such measures, he said, are rapidly becoming a necessity for IoT developers. Too often, he said, those developers mistakenly believe there’s no need for security because they see no obvious reason for hackers to want their data. But that reasoning is faulty, he said, because developers can’t always imagine why thieves might want data.

RELATED ARTICLES:

“Five years ago, people would say, ‘Why would anyone want to do that?’” Prestridge told us. “Now, they’re starting to realize that doesn’t matter. Sometimes people will do it just because they can.”  

Senior technical editor Chuck Murray has been writing about technology for 35 years. He joined Design News in 1987, and has covered electronics, automation, fluid power, and auto.

ESC, Embedded Systems Conference

ESC BOSTON IS BACK!
REGISTER TODAY!

The nation's largest embedded systems conference is back with a new education program tailored to the needs of today's embedded systems professionals, connecting you to hundreds of software developers, hardware engineers, start-up visionaries, and industry pros across the space. Be inspired through hands-on training and education across five conference tracks. Plus, take part in technical tutorials delivered by top embedded systems professionals. Click here to register today!

About the Author(s)

Charles Murray

Charles Murray is a former Design News editor and author of the book, Long Hard Road: The Lithium-Ion Battery and the Electric Car, published by Purdue University Press. He previously served as a DN editor from 1987 to 2000, then returned to the magazine as a senior editor in 2005. A former editor with Semiconductor International and later with EE Times, he has followed the auto industry’s adoption of electric vehicle technology since 1988 and has written extensively about embedded processing and medical electronics. He was a winner of the Jesse H. Neal Award for his story, “The Making of a Medical Miracle,” about implantable defibrillators. He is also the author of the book, The Supermen: The Story of Seymour Cray and the Technical Wizards Behind the Supercomputer, published by John Wiley & Sons in 1997. Murray’s electronics coverage has frequently appeared in the Chicago Tribune and in Popular Science. He holds a BS in engineering from the University of Illinois at Chicago.

Sign up for the Design News Daily newsletter.

You May Also Like