Rise of the Internet of Things (IoT) | TechRadar

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

They are already here. And they might already have outnumbered us. Their proliferation is breath-taking, with an estimated population reaching 125 billion in the next 10 years. IoT devices are the poster boys of a societal digital transformation, poised to revolutionise the way we live, play and work.

But, are we really in control of this exponential explosion of Internet connected machines? And, what does this massive machine-to-machine network mean from a security perspective? What are the associated threats and resulting risks of IoT devices, encompassing everything from wearables to the industrial control systems behind power grids?

The last five years have been a playground for a new generation of malware software targeting both embedded devices and IoTs. Slowly, the world is waking up to the consequences of prioritising time-to-market and cost over any security consideration when developing connected or “Smart” devices. Smart meters, smart homes, smart anything, can all be less smart than their names suggest, and they are vulnerable. The mean time required to compromise a vulnerable IoT device on the Internet is now down to around five minutes and within 24 hours threat actors can launch targeted attacks aimed at compromising specific devices.

Many of these vulnerable IoT devices are online 24 hours a day, 7 days a week and have significant bandwidth available. This makes them not only attractive targets for conscription into Distributed Denial of Service (DDoS) botnets, but also innocent stepping stones for the compromise of internal networks through their backend connectivity. In every element of the threat landscape, from ransomware to cryptomining, there is potential for IoT devices to be used as a gateway both in home and enterprise networks.

Without a doubt, everyone faces an unprecedented technical challenge when it comes to managing IoT risk: Internet-facing IoTs represent only 5% of the total number of devices out there; the other 95%, pose a complex risk and IT service management problem due to their inherent nature:

Even when a software fix or new firmware is released for a device its deployment is often not practical. For example, where is the device? Can it be updated remotely? Does it require physical access and custom-made cables for upgrade?

As 5G becomes a reality, billions of humans and trillions of machines will gain access to enhanced mobile broadband for a wide range of applications from mission critical medical surgeries, to emergency services and augmented/virtual reality. And, to make matters worse, all the above issues are exacerbated by the long shelf life of devices. Obsolete and insecure IoT devices are here to stay and will haunt us for years to come.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

With the sheer number of IoT devices out there that pose a risk either individually or collectively, identification, supervision and asset management capabilities will become even more critical.

Inferring the identity (what it is) and function (what it does) of an IoT device by monitoring network traffic is fast becoming, from an operational perspective, a necessity for all network operators. This will allow them to assess their level of risk and the nature of that risk, so that it can be managed appropriately. But, this is no easy task. The visibility needed across a network is both broad and deep.

Internet Service Providers are already seeking assistance from their trusted partners to provide them with the visibility and monitoring capabilities they need across their evolving service infrastructure. Equipped with an ability to identify the type and location of IoT devices on their networks, operators will be able to defend both themselves and their customers from threats.

The Internet of Things has the potential to radically change our lives. IoT devices are driving radical technological and cultural changes, transforming our current IT landscape. Ultra-fast transfer rates, enhanced user experience, augmented and virtual realities are among the numerous applications consumers have been eagerly waiting for their smarter future.

But, as IoT starts fuelling innovation in key sensitive industries such as healthcare, transportation and public utilities – bringing in its wake the fourth industrial revolution – the networks of tomorrow will require effective security oversight of IoT devices, to address both the availability and reliability of new services, and the privacy and safety of consumers.

Darren Anstee is the CTO, SBO International, at Netscout. He has more than 20 years of experience in networking and security. In his current role, he is working with customers to understand today’s most complex security challenges.

This malware botnet bricked over 600,000 routers in coordinated attack — but no one is really sure why

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

©
Future US, Inc. Full 7th Floor, 130 West 42nd Street,
New York,
NY 10036.