figures
Blog

IoT Security Challenges In 2020 and Beyond

Admin Globaldots
06.02.2020
image 4 Min read

As we look ahead to this year and beyond, we can expect to see an explosion in numbers—think billions—with respect to 5G networks connecting Internet of Things (IoT) devices. The IoT will be a system of many millions of different types of devices for a multitude of applications. Such devices will communicate autonomously with each other and their users via the cloud.

We can expect to see mobile network operators (MNOs) implementing these new 5G standards in their networks to make the IoT a reality, and we will certainly witness a huge shift of enterprise computing function to the edge. You won’t have to rely on a data center—effectively, you will be able to put that in “next to” your workforce.

A 5G world is the services that IT can provide through software-defined networking (SDN) and the virtual network functions at the edge—the need for MNOs to be able to scale on demand for their users’ needs becomes much more important. From a security point of view, consumers will simply be able to turn on a firewall—no fuss, and they can click a button that is virtualized and on the edge of the network. This makes it much easier to deploy the latest security; it’s all virtualized and close to the end user.

The era of 5G should be a great thing because it will accelerate the use and development of real-time applications. But with all this increased data going through a device or through a pipeline, you will certainly need more control of that data, and you’ll need tools that allow IT departments to be able to control it—especially from a security perspective, but also from a performance perspective. A massive proliferation is expected in IoT devices, and they will all be feeding massive amounts of data to the edge. A huge problem here is that none of the current security protocols regarding the IoT are standardized, and this presents a massive security risk to the world of 5G.

Imagine all these connected having no security standard for how they secure and authenticate with each other. Telcos and infrastructure firms will no doubt praise 5G for a wide variety of industrial use cases. However, if 5G is to be used for crucial industrial processes—think actual business impact—then you face a potentially risky scenario: when you have industrial environments using out-of-date legacy technology, it’s a sure bet hackers will begin to target these environments, with potentially very damaging results.

Traditional security approaches against the most obvious attacks on security are insufficient. We need solutions that can enable IoT devices to learn and adapt to various threats dynamically, in order to be able to address them in a more proactive fashion. Machine-learning (ML) techniques could be employed that provide both intelligence and the ability to reconfigure assorted IoT devices. The integration of the IoT with big data and cloud computing presents new challenges, such as data analytics, integration and storage—not the least of which are privacy and security concerns regarding sensor-generated data from misuse, theft or unfortunate losses.

Perhaps blockchain will provide the answers. There are those who believe blockchain can undertake some of the challenges presented by IoT security, for which you have myriad distributed devices that work well with the decentralized nature of blockchain. There again, perhaps blockchain is initially better suited in helping to secure the integrity of data within connected devices. Artificial-intelligence (AI) solutions also offer tremendous potential here. With the current state of AI maturity, products that are carefully designed for specific use cases will be more effective than those offering a more blanket approach.

Could 2020 herald the first instances of real adoption of AI within industrial enterprises—more specifically, vertical use cases in the Industrial Internet of Things (IIoT) landscape? I think so. As we see the use of artificial intelligence growing and maturing, we should witness a more targeted use, making it more precise overall.

IoT devices, as well as their associated connections to networks and the cloud, remain a weak link in security. With an ever-growing volume of personal data that will need to be secured against attacks and theft, a more comprehensive approach to IoT security will be necessary, with solutions that manage challenges across all industry and business sectors.

If you have any questions about how we can help you optimize you protect your business against cyberattacks, contact us today to help you out with your performance and security needs.

*This article originally appeared in RFID Journal  on February 2, 2020

Comments

0 comments

There’s more to see

slider item
Identity & Access Management (IAM)
4 Credential Phishing Myths You Can’t Ignore
Li-Or Amir 28.04.21

Credential phishing is the practice of stealing user ID/email address and password combinations by masquerading as a reputable or known entity. Attackers then use the victim’s credentials to carry out attacks on a secondary target, such as breaching into enterprise networks. GlobalDots, in collaboration with Identity Governance market leader Okta, gathered 4 common misconceptions which lead […]

Read more
slider item
Content Delivery Network (CDN)
Multi Content Delivery Network Explained
Admin Globaldots 21.04.21

Your query on the web to find out about CDN, multi CDN, federated CDN, hybrid CDN and why is it important at all, can easily turn into a stream of different, sometimes confusing information, as these terms are getting more and more popular, and definitions are more and more dispersed, given the number of providers […]

Read more
slider item
Infrastructure DDoS
DDoS (Distributed Denial of Service) Explained
Admin Globaldots

DDoS Mitigation & Protections services are a crucial part of any internet business strategy. At GlobalDots we analyze, implement and maintain Security for variety of companies, from Fortune 500 to startups and small-to-medium enterprises. Since the topic is broad and many of our customers ask very specific questions, we decided to put together this resource […]

Read more

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us
figure figure figure figure figure