Instrumented Interconnecteds Intelligent
March, 18th 2011

In the next couple of years, there are expected to be 2 billion people connected to the Internet. At the same time, the instrumentation and interconnection of the world’s human-made and natural systems is exploding–which could mean that there soon will be more things connected to the Internet than there are people who are connected. This Internet of Things promises to give people a much better understanding of how complex systems work, so they can be tinkered with to make them work better. But it also opens up a whole new sphere of insecurity. Each of those sensors is, potentially, a point of vulnerability to people who write malicious code for fun, or profit, or to further their political goals.

Andreas Wespi

Andreas Wespi

Harm could come in many forms, but some of the most hurtful scenarios for attacks on the Internet of Things  include electrical power and communications blackouts, disruption of air traffic and roadway traffic lights, interruption of oil and gas exploration and contamination of water. So far, these concerns are mostly theoretical, but the spread of  Stuxnet, the computer worm that targets control systems at nuclear power plants, shows just how dangerous such attacks can be. The worm knocked out about 1,000 centrifuges at Iran’s Natanz uranium enrichment plant last year–and atomic energy experts warn that it has the capability of creating Chernobyl-like disasters. “We have to understand the new threats and understand how to protect our own infrastructure,” says Andreas Wespi, a cybersecurity expert at IBM Research’s Zurich laboratory.

Attacks will likely come in two ways: to the sensors and to the servers that gather, store, and analyze information from the sensors. Both kinds of vulnerability must be addressed.

Let’s start with the sensors, which Wespi calls “the weakest link in the system.” Sensors connected to the Internet can take many forms, ranging from simple devices that measure things like temperature to video cameras that monitor the physical security of anything from city streets to remote oil pipelines. We have to develop and deploy new technologies that signal when sensors are not working reliably or have been tampered with. IBM  scientists are developing technology that can be embedded in sensors, to do just that. One of the challenges is that simple sensors much be very inexpensive to be affordable on a mass scale, so the modules that IBM is developing must be extremely cheap–costing just pennies per device. Also, it will be vital to embed security in the sensor networks before they’re installed, rather than trying to retrofit them later.

A lot of work has been done over the past two decades to defend computer servers and networks from malicious attacks, but the emergence of the Internet of Things is forcing cybersecurity experts to rethink how such assets are protected. In the past, one of the key strategies for protection control systems was to isolate them from other networks. But now that control systems are being connected to the Internet, that approach won’t work well anymore. What’s needed, Wespi says, is a multi-tier security system–combining protections for individual servers and applications with more powerful access controls and network monitoring.

The Internet of Things creates exciting new possibilities, but it can only deliver on its promises if it’s reliable and trustworthy. Now is the time to start addressing these concerns.

Bookmark and Share

Previous post

Next post

March 31, 2016
10:13 am

Very good information. It should be shared more often.

In Polish

Nie stać Cię na urządzenia internet of things? Zawsze możesz wziąć pożyczkę pod zastaw nieruchomości.

Posted by: Pożyczki bez BIK
May 13, 2015
7:18 pm

The maximum area where by you can receive the ssuited remedy and discover just how to givbe adult up could be online.

Posted by: siti video
April 9, 2015
4:13 am

Najlepszą różnicą pomiędzy zaciągnięciem kredyty w takiej firmie zaś w banku jest wielkość
oprocentowania tejże pożyczki.

Posted by: pożyczki pod zastaw
March 30, 2015
11:09 pm

Każda udzielana pożyczka pod zastaw nieruchomości jest dobierana w taki sposób,
by pomóc osobie zadłużonej pójść na tzw.

Posted by: prywatne pożyczki gotówkowe wrocław
February 4, 2015
1:36 am

We also apologise to any person offended by the article in the OPSM (subscription copies have been sent out ahead of street date).

Posted by: Free Ps4 themes
January 24, 2015
8:17 am

So there you have it four years later and the games nonetheless look and really feel Considerably better on the Xbox!

Posted by: Hyman
January 5, 2015
6:44 am

Excelklent post. Keeep psting such kind of into on your
blog. Im reallyy impressed by it.
Hello there, You’ve performed a fantastic job. I’ll certainly digg
it and in my view recommend to my friends. I’m confident
thdy will be benefited from this site.

Posted by: Eileen
October 23, 2014
3:03 am

Yes! Finally something about general.

Posted by: collection suspenders 1
October 6, 2014
9:02 am

Thanks for finally talking about >Security and the Internet
of Things

Posted by: Louann
July 22, 2014
6:02 am

If you wish to keep one shut at palm for spur of the minute snapshots, you may attempt a
the Olympus Immensity Junior 35mm movie camera. The Nokia 808 Pure – Perspective is
because of release in Could 2012 with cost for the Symbian Belle-powered smartphone of ’450
or 600 United States dollars. My tip will be actually to
see your closest electronic electronics outlet as well as examining out the versions you
are actually thinking of getting.

Posted by:
December 22, 2013
11:36 am

I’m extremely inspired with your writing abilities and also with the format on your blog. Is this a paid topic or did you modify it your self? Either way stay up the excellent high quality writing, it’s uncommon to look a nice blog like this one nowadays..

Posted by: Samsung DSLR cameras
October 24, 2013
7:35 pm

This design is incredible! You certainly know how to keep a reader entertained.
Between your wit and your videos, I waas almost moved to start my own blog (well, almost…HaHa!)
Fantastic job. I really enjoyed what you had to say, and more than that, how you presented it.
Too cool!

Posted by:
July 28, 2013
1:10 pm

Good post. I be taught one thing more difficult on completely different blogs everyday. It’s going to at all times be stimulating to learn content material from different writers and observe somewhat one thing from their store. I�d want to make use of some with the content material on my weblog whether or not you don�t mind. Natually I�ll provide you with a hyperlink in your internet blog. Thanks for sharing.

Posted by: Audry Wreyford
July 21, 2013
8:04 pm

Greetings I am so excited I found your blog, I really found you by error, while I was researching on Askjeeve for something else, Regardless I am here now
and would just like to say thanks a lot for a remarkable
post and a all round exciting blog (I also love the theme/design), I don’t have time to read it all at the moment but I have bookmarked it and also added in your RSS feeds, so when I have time I will be back to read a lot more, Please do keep up the awesome work.

Posted by: Elvis
July 16, 2013
1:17 am

Nice post. I was checking constantly this blog and I am impressed!

Very helpful information specially the last part :) I
care for such info a lot. I was seeking this particular information for a very long time.
Thank you and best of luck.

Posted by: Steam Keygen
July 30, 2012
3:00 am

That’s really very informative I have got. Great stuff shared at this website and I also like the design of this website.

Posted by: virginia limo
November 30, 2011
2:37 am

Now a days internet is becoming much risky for private information or personal data from internet hackers…

Posted by: Taxis Toronto
November 16, 2011
9:42 am

Nearly all of the things you state occurs to become astonishingly correct and which makes me ponder the cause why I hadn’t checked out this with this light previously. This particular piece truly did flip the light on for me personally so far as this topic make any difference goes. But there is one position I am not actually as well comfy with so while I make an work to reconcile that with the true core theme of the point, permit me observe what all the relaxation of the readers need to say.Nicely carried out.

Posted by: pagina web madrid
November 10, 2011
7:16 pm

you’ve gotten an awesome blog here! would you wish to make some invite posts on my weblog?

Posted by: pacquiao vs marquez live streaming
October 11, 2011
1:47 am

camisetas de futbol
This is a wonderful blog. I thinks that this blog must be knowledgeable for all human bang .Congratulation for this informational blog .

Posted by: camisetas de futbol
September 12, 2011
4:19 pm

I don’t unremarkably comment but I gotta say thanks for the post on this great one : D.

Posted by: prawo jazdy katowice
August 31, 2011
2:32 am

wonderful post, very informative. I wonder why the other experts of this sector do not notice this. You should continue your writing. I am confident, you’ve a huge readers’ base already!

Posted by: Kosmetyka
August 26, 2011
4:41 pm

Eurotech – Advanced Web Development Services for all Global Websites

The all information of that blog is great sensitive in any informational website . and any IT sector . thank you so much for that blog site.

Posted by: Eurotech - Advanced Web Development Services for all Global Websites
August 18, 2011
2:15 am

This blog information is so helpful for all mankind .it is a great article for that requirement.Thank you for submitted that blog.

Posted by: Motivation
July 3, 2011
9:31 am

It is helpful, however, I think Internet is just a tool to change our life better. which can not replace the main social intercourse.

Posted by: stig
June 26, 2011
2:55 am

Very helpful information. I am very fortunate that I discovered your site accidentally. used HTC Touch Diamond 2

Posted by: michael04
3 Trackbacks
January 26, 2015
9:45 am

[…] But what if this sensitive information were to end up in the wrong hands? It could be used and abused for a whole host of reasons that leads us to the second major concern – security. […]

Posted by: Should We Welcome the Internet of Things? | QueryClick
October 22, 2014
12:16 pm

ウサギ usチモシー2番刈りダブルプレス

Smart Grids Archives « Page 3 of 7 « A Smarter Planet Blog A Smarter Planet Blog

Posted by: ウサギ usチモシー2番刈りダブルプレス
March 24, 2011
5:44 am

[...] Security and the Internet of Things. [...]

Posted by: Security and the Internet of Things | A Smarter Planet (Switzerland)
Post a Comment