Securing the IoT takes
Strategic Investment
By Huawei
Ubiquitous connectivity brings
security concerns. To realize the life-
saving potential of robotic surgery
and enjoy the convenience of smart
homes and self-driving cars, we
must secure the IoT at every possible
level.
A
s the Internet of Things (IoT) combines
with big data and cloud computing, and
other technologies, the world grows more
connected. Gartner estimates that by 2020,
there will be about 21 billion connected devices
worldwide.
The se ubiquitous connec tions have
tremendous potential to deliver broad economic
and social benefits. McKinsey projects that the
IoT will create up to US$11 trillion in economic
benefits by 2025 and contribute 11% to the global
economy.
But ubiquitous connectivity brings security
concerns. To realize the life-saving potential of
robotic surgery and enjoy the convenience of
smart homes and self-driving cars, we must
secure the IoT at every possible level. How can we
rise to this challenge?
IoT sensors and gateways have less
processing and storage capacity than traditional
IT infrastructure, and these constraints make it
difficult for them to run complex security protocols.
Any solution that overcomes this challenge will
involve multi-layered defense measures that
prevent cyber attacks on the IoT. It will detect
attacks as soon as they occur and isolate any
compromised components from the larger system.
Data stored in the cloud must be encrypted,
making it unusable to anyone who would steal or
tamper with it.
What’s needed is a framework that uses the
best security measures available to construct an
integrated system of defense. Such a framework
provides protection at three levels – device,
network, and platform – and prescribes a system
for managing network governance, operations,
and maintenance (O&M).
First, devices should be fortified with multiple
defensive capabilities. These are adapted to
the needs of different industries, and take into
account the computing capacity of each device
and how it will be used. Security is engineered into
the device chipset to support a range of defensive
protocols that protect devices from malicious
attacks.
Second, networks themselves should be
enhanced with strong protocols that detect and
isolate devices that come under attack. When
a device is compromised, the network defense
detects the threat and isolates the device,
preventing it from harming the IoT platform or the
network.
23