SECTIONS - Caught in the Crossfire
February 02, 2018

Security and the Internet of Things - Take Two

The first step is admission, so let me say it now: I was wrong!

I have been looking at the obstacles for adoption of IoT, and one of them has been security. If you are part of this industry you have heard the joke. “IoT; the S is for security”.  Candidly this joke upsets me – tremendously.

In the article about industrial controls I talked briefly about the computer worm Stuxnet. Kim Setter from Wired magazine covers it well with “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” .  While the system originally targeted Siemens Industrial Controls via Microsoft Windows computers specifically in Iran’s nuclear program, the ability to penetrate industrial controls was not known for at least five years. 

As Richard Soley of the Industrial Internet Consortiums conveys, there are two kinds of companies “those that know they have been hacked, and those that do not.” This is the real problem for IoT. It’s not a place where people work and live. Things only tell you they are in trouble if you design for it.  For more than 40 years we have not designed for systems to tell us everything including security.

Now with all this said, where is my error? The answer is in my projection where the solution can be found.

I believe the answer to managing a legacy problem can be solved by networking, and my thought process was that this would be done by IT. 

Candidly, I showed my age. Twenty years ago when I left the large organizations, IT was a strategic asset and had a lot of command and control.  One more aspect (victim?) of digital transformation is IT. In today’s market place, IT is an expense line, not an asset.

In the past month I have talked to third-party maintenance firms, staff augmentation companies (including Crossfire Consulting, my parent company), and of course cloud providers. Now in theory the chief information security officer can be the hope for a network security solution.

Ken Briodagh advocates that the problem needs to be solved in the hardware. Recently I spoke with Dipti Vanchani, vice president and general manager of the Internet of Things Group at Intel Corp. Intel and others have enabled identity in the silica with their Enhanced Privacy ID, eliminating a lot of opportunity for human error and deliberate malice. In effect security is becoming integrated in the operations.

The reason I wanted to solve this at the network layer is because operationally IoT is in lots of different areas within a corporation: buildings, manufacturing, retail, and supply chain.  

Edited by Ken Briodagh

Back to Homepage
Comments powered by Disqus



Rich Tehrani
Since 1982 Rich has led TMC © in many capacities. Rich Tehrani is an IP Communications industry expert, visionary, author and columnist. He founded INTERNET TELEPHONY ™ magazine... READ MORE

Paula Bernier
Executive Editor, TMC
Paula Bernier is Executive Editor at TMC where she writes, edits and manages editorial content for INTERNET TELEPHONY, M2M Evolution, and CUSTOMER magazines... READ MORE

Carl Ford
Partner and Community Developer, Crossfire Media
Today as a partner at Crossfire Media, Carl is developing programs that bring to light an understanding of the issues required for delivering broadband wireless Internet... READ MORE

Erik Linask
Group Editorial Director, TMC
Erik oversees the editorial content and direction for all of TMC. Erik has contributed literally thousands of features during his 5-year tenure, with a focus... READ MORE