- Home >
- Services >
- Access to Knowledge >
- Trend Monitor >
- Source of threat >
- Trend snippet: IoT security challenge: secure communications and infrastructure
Trends in Security Information
The HSD Trendmonitor is designed to provide access to relevant content on various subjects in the safety and security domain, to identify relevant developments and to connect knowledge and organisations. The safety and security domain encompasses a vast number of subjects. Four relevant taxonomies (type of threat or opportunity, victim, source of threat and domain of application) have been constructed in order to visualize all of these subjects. The taxonomies and related category descriptions have been carefully composed according to other taxonomies, European and international standards and our own expertise.
In order to identify safety and security related trends, relevant reports and HSD news articles are continuously scanned, analysed and classified by hand according to the four taxonomies. This results in a wide array of observations, which we call ‘Trend Snippets’. Multiple Trend Snippets combined can provide insights into safety and security trends. The size of the circles shows the relative weight of the topic, the filters can be used to further select the most relevant content for you. If you have an addition, question or remark, drop us a line at info@securitydelta.nl.
visible on larger screens only
Please expand your browser window.
Or enjoy this interactive application on your desktop or laptop.
IoT security challenge: secure communications and infrastructure
5.10 SECURE COMMUNICATIONS AND INFRASTRUCTURE
IoT devices transmit information to a back-end for processing and analytics. Depending on the computational capabilities of the devices, it may be possible to filter some of the data before transmission or even to take immediate action locally without sending any data at all; however, all IoT systems do, at some point, send data over a network to a back-end. There are numerous ways to achieve this connectivity, ranging from direct cellular or satellite connections to low-power WANs with gateways to reach the back-end. Security is paramount since IoT devices based on different technologies and acquired from various suppliers on the global market communicate via heterogeneous network interfaces in an open network that is untrustworthy and potentially hostile.
5.10.1 Current Landscape and Recent Developments
When a device connects to the back-end, a gateway or other devices, it must authenticate and establish trust. Once trust is established, devices, users and services can securely communicate, interact and transact information. This challenge encompasses all elements that route and transport endpoint data traffic securely over the infrastructure, whether control, management or actual data traffic.
5.10.2 Key Findings
- The networking and interoperability challenge has seen extensive work as well as significant standardisation; however, an in-depth review is required of the security of these communication solutions and the security and privacy requirements on each level of the communication stack in the IoT ecosystem.
– Good practices are lacking regarding the technical feasibility of security controls running on resourceconstrained devices. Security reference architectures are required.
- Secure gateways can provide high-security deployments even with low-cost IoT devices.