Ingenieur Vol 73 ingenieur Jan-March 2018 | Page 25

Securing the IoT takes Strategic Investment By Huawei Ubiquitous connectivity brings security concerns. To realize the life- saving potential of robotic surgery and enjoy the convenience of smart homes and self-driving cars, we must secure the IoT at every possible level. A s the Internet of Things (IoT) combines with big data and cloud computing, and other technologies, the world grows more connected. Gartner estimates that by 2020, there will be about 21 billion connected devices worldwide. The se ubiquitous connec tions have tremendous potential to deliver broad economic and social benefits. McKinsey projects that the IoT will create up to US$11 trillion in economic benefits by 2025 and contribute 11% to the global economy. But ubiquitous connectivity brings security concerns. To realize the life-saving potential of robotic surgery and enjoy the convenience of smart homes and self-driving cars, we must secure the IoT at every possible level. How can we rise to this challenge? IoT sensors and gateways have less processing and storage capacity than traditional IT infrastructure, and these constraints make it difficult for them to run complex security protocols. Any solution that overcomes this challenge will involve multi-layered defense measures that prevent cyber attacks on the IoT. It will detect attacks as soon as they occur and isolate any compromised components from the larger system. Data stored in the cloud must be encrypted, making it unusable to anyone who would steal or tamper with it. What’s needed is a framework that uses the best security measures available to construct an integrated system of defense. Such a framework provides protection at three levels – device, network, and platform – and prescribes a system for managing network governance, operations, and maintenance (O&M). First, devices should be fortified with multiple defensive capabilities. These are adapted to the needs of different industries, and take into account the computing capacity of each device and how it will be used. Security is engineered into the device chipset to support a range of defensive protocols that protect devices from malicious attacks. Second, networks themselves should be enhanced with strong protocols that detect and isolate devices that come under attack. When a device is compromised, the network defense detects the threat and isolates the device, preventing it from harming the IoT platform or the network. 23