SECURITY
SECURITY
SECURITY
IoT devices might seem too small or specialized to pose a risk to enterprises,
but that couldn't be further from the truth.
Even if an organization has locked down the physical devices and enacted basic
IoT security measures, systems remain vulnerable. Many cybersecurity experts
forget IoT application security when designing a security strategy.
6. Secure communication
Encrypting data between IoT devices, apps and back-end systems keeps data
safe from attackers. That includes encrypting data at rest and in transit
and adopting PKI security models to ensure both senders and receivers get
authenticated on the system before transmitting.
Security
Logs and keys leakage
Management
Management
Failure of the management system
system
Above all, the area of use of cryptography in the internet of things is in securing
the communication channels.
IoT-centric communication protocols, for example, MQTT and AMQP allow
developers to use Transport Layer Security (TLS) to ensure all data sent over
the network is unreadable to outside parties.
TLS is the rightful heir to the better-known standard known as Secure Sockets
Layer (SSL), which was the long-time standard for web encryption (see
HTTPS) but is now considered insecure.
TLS ensures that data between two entities is not readable nor prone to
manipulation by third parties.
In addition to encrypting the main data connections, it’s also important to
encrypt any available secondary communication channels such as those use for
maintenance or customer features.
For instance, if an IoT device comes with a web portal for use by consumers
(think of a web interface for a printer) that should also come encrypted by
default.
That is to say, anyone on the same network could intercept usernames,
passwords, or use session data to impersonate those logged in to control these
devices. For the same reason, insecure maintenance interfaces like telnet should
be shuttered in favor of secure approaches like Secure Shell (SSH).
According to recent research, Cryptography (or more specifically, Symmetric
Cryptography) will be a key point in order to provide security for IoT
environments. Therefore, in addition to confidentiality, integrity, privacy,
availability, suitability, non-repudiation, and trust, security technologies
including cryptography have also become relevant in this domain.