Skip to content
IRI Logo
Solutions Products
  • Solutions
  • Products
  • Blog
  • BI
  • Big Data
  • DQ
  • ETL
  • IRI
    • IRI Business
    • IRI Workbench
  • Mask
  • MDM
    • Master Data Management
    • Metadata Management
  • Migrate
    • Data Migration
    • Sort Migration
  • Test Data
  • Transform
  • VLDB
  • VLOG

The Formidable but Imperative Task of IoT Security

  • by Donna Davis

The Internet of Things (IoT) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices.  But as they provide more and more advantages, and even become essential to our daily lives, security has not managed to keep pace with the vicissitudes of the rapid development taking place.  

This article discusses some of the substantial economic and safety risks, challenges and vulnerabilities, as well as strategic principles and practices to consider when endeavoring to secure your IoT operation or application.

Associated Risks

It is no secret that the ubiquity of IoT has led to the increasing prevalence of cybercrime. Data is being stolen at an alarming rate while it is being generated, gathered, and analyzed.  Vigilante.pw, a prominent, non-profit website continually logging data breaches and compromised databases, shows in real time just how frequent this problem is.  

Data breaches often include payment card information (PCI), personally identifiable information (PII), sensitive personal information (SPI), and protected health information (PHI), which are among the most valuable commodities for sale on the black market.

“Right now there’s a much bigger database leaking/trading scene than ever before,” according to Keen, the pseudo-named owner of Vigilante.pw.  “There are a lot of different people playing in this scene.  I don’t think anything is getting better, that much is pretty clear, (and) there’s a lot of stuff out there that we don’t even know about.”

In addition to privacy concerns, there are physical risks, too, with IoT connected devices and the information they produce. Concern is escalating over those utilizing them for crimes like impersonation and cyber-theft, and for sowing discord. Harassment and stalking, break-ins, fraudulent transactions, vandalism, and burglary are also possible.

IoT Authorization

Challenges and Vulnerabilities

Unauthorized access that makes data, property, and lives vulnerable must be avoided, especially in mission-critical environments like banking and healthcare. IoT is mostly dependent on cloud and mobile services for information exchange between applications and their devices. Thus, sufficient measures to configure the security of these interfaces are paramount in making sure data is transferred, processed, and stored safely.  

The majority of IoT devices transmit data via a Web Interface, and many of those transmissions have security holes. Allowing plaintext login credentials, and not requiring strong passwords or disabling access after a certain number of failed login attempts can all lead to lost data and control of the IoT device.

Data can also be intercepted if network communications are unencrypted, or transmitted through insecure protocols.  More stringent regulations are necessary to prevent data loss and manipulation. Otherwise, IoT devices may be compromised and used in deviant ways, or rendered unusable.

Regular firmware or software updates may then be necessary once all interfaces are secure.  Integrity verification and systems with strong authentication/authorization procedures may be difficult and expensive to implement. However, the risks and results of not doing so may be much costlier!

Cloud Interface

Physical security is also necessary for many IoT devices. Businesses should mandate strict monitoring and control over the physical access to their devices to safeguard the data used for analytics, application integration, and other purposes. Like cloud and mobile interfaces, the consequences of neglecting physical security can end up being dire.

IoT Security Principles and Practices

Implementing security beyond the basics — which some IoT devices don’t even have — can help mitigate the kinds of risks and vulnerabilities above. The U.S. Department of Homeland Security recommends the following six principles, along with suggested practices to address IoT security challenges:1

  • Incorporate Security at the Design Phase.
      1. Enable security by default through unique, hard to crack default usernames and passwords.
      2. Build the device using the most recent operating system that is technically viable and economically feasible.
      3. Use hardware that incorporates security features to strengthen the protection and integrity of the device.
      4. Design with system and operational disruption in mind.  Where feasible, developers should build IoT devices to fail safely and securely, so that the failure does not lead to greater systemic disruption.
  • Promote Security Updates and Vulnerability Management.
      1. Consider ways in which to secure the device over network connections or through automated means.
      2. Consider coordinating software updates among third-party vendors to address vulnerabilities and security improvements to ensure consumer devices have the complete set of current protections.
      3. Develop automated mechanisms for addressing vulnerabilities.
      4. Develop a policy regarding the coordinated disclosure of vulnerabilities, including associated security practices to address identified vulnerabilities.
      5. Develop an end-of-life strategy for IoT products.
  • Build on Recognized Security Practices.
      1. Start with basic software security and cybersecurity practices and apply them to the IoT ecosystem in flexible, adaptive, and innovative ways.
      2. Refer to relevant Sector-Specific Guidance, where it exists, as a starting point from which to consider security practices.
      3. Practice defense in depth. Developers and manufacturers should employ a holistic approach to security that includes layered defenses against cybersecurity threats, including user-level tools as potential entry points for malicious actors.
      4. Participate in information sharing platforms to report vulnerabilities and receive timely and critical information about current cyber threats and vulnerabilities from public and private partners.
  • Prioritize Security Measures According to Potential Impact.
      1. Know a device’s intended use and environment, where possible.
      2. Perform a “red-teaming” exercise, where developers actively try to bypass the security measures needed at the application, network, data, or physical layers.
      3. Identify and authenticate the devices connected to the network, especially for industrial consumers and business networks.
  • Promote Transparency across IoT.
      1. Conduct end-to-end risk assessments that account for both internal and third party vendor risks, where possible.
      2. Consider creating a publicly disclosed mechanism for using vulnerability reports.
      3. Consider developing and employing a software bill of materials that can be used as a means of building shared trust among vendors and manufacturers.
  • Connect Carefully and Deliberately.
      1. Advise IoT consumers on the intended purpose of any network connections.
      2. Make intentional connections.  There are instances when it is in the consumer’s interest not to connect directly to the Internet, but instead to a local network that can aggregate and evaluate any critical information.
      3. Build in controls to allow manufacturers, service providers, and consumers to disable network connections or specific ports when needed or desired to enable selective connectivity.

IRI’s Data-Centric Security Contributions

IRI is a data management and protection ISV whose tools secure data at the field level in IoT devices and hubs, mainly by masking it at rest in log files or databases, or in MQTT and other streams.

One example of an IRI data-centric security function is field-level encryption, which can also be format-preserving encryption (FPE). FPE is a best practice in IoT because it allows you to mask and transfer data securely, while maintaining its original format and storage space. Encrypting data values at the field level can stem the losses from device or communication breaches because the data involved was already protected.

Conclusion

With 50 billion IoT devices predicted to be in use by 2020, it really is at the intersection of big data gathering and communication. The storage, dissemination, and use of that data represent tradeoffs between risks and rewards, so we must strive to protect what’s sensitive in that data. IoT security is not only a means to an end, it’s a necessity to ensure the continued growth and development of free enterprise and information technology. The lifestyles to which we have become accustomed will depend on it.

  1. Strategic Principles for Securing the Internet of Things (IoT), Version 1.0 – DHS Release, November 15, 2016
How to Run Remote Jobs from IRI Workbench
Unmasking the HL7 Data Standard
cyber crime cyber-theft format-preserving encryption FPE Internet of Things IoT payment card information PCI personally identifiable information PHI PII protected health information security sensitive personal information SPI

Related articles

DarkShield PII Discovery & Masking…
Masking Flat Files in the…
Directory Data Class Search Wizard
Masking PII in a Relational…
IRI Data Class Map
Schema Data Class Search
Training NER Models in IRI…
Masking NoSQL DB PII in…
Masking RDB Data in the…
IRI DarkShield-NoSQL RPC API
Find & Mask File PII…
3 COMMENTS
  • What Is the Internet of Things? – Machbase Blog
    September 16, 2019 at 3:15 am
    Reply

    […] is, when it comes to digital security, the white hats are always going to be a step behind the black hats: the only proof you need is the […]

  • INTERNET OF THINGS | ITSCARP
    August 6, 2018 at 2:24 pm
    Reply

    […] is, when it comes to digital security, the white hats are always going to be a step behind the black hats: the only proof you need is the […]

  • What Is the Internet of Things? - Machbase Database
    June 28, 2018 at 5:18 am
    Reply

    […] is, when it comes to digital security, the white hats are always going to be a step behind the black hats: the only proof you need is the […]

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Big Data 66
  • Business Intelligence (BI) 77
  • Data Masking/Protection 163
  • Data Quality (DQ) 41
  • Data Transformation 94
  • ETL 122
  • IRI 229
    • IRI Business 86
    • IRI Workbench 162
  • MDM 37
    • Master Data Management 12
    • Metadata Management 25
  • Migration 65
    • Data Migration 60
    • Sort Migration 6
  • Test Data 102
  • VLDB 78
  • VLOG 40

Tracking

© 2025 Innovative Routines International (IRI), Inc., All Rights Reserved | Contact