Internet of Things: “Development” and “Security” are more important?

HC Security Network News Imagine this scenario: When we opened his sleepy eyes dim, early morning first ray of sunshine through the window and then, as the curtain opened automatically, slowly brighten the entire bedroom; wash finished when we went into the kitchen The smart kitchen system has already prepared a hearty breakfast.

In the era of “Internet of Everything”, smart devices such as smart bracelets that can monitor sleep status, smart homes that “know what you think”, and smart applications such as car networking and smart transportation that provide reliable reference information for transportation every day. Whether it is intelligent sensors or industrial robots for monitoring and controlling production in industrial production, Internet of Things applications are everywhere, and its safety is closely related to people's production and life.

1

Is it a "victim" or an "accomplice"?

Huang Dianzhong, deputy director of the Expert Committee of the China Information Security Evaluation Center, told the author that as of 2015, nearly 5 billion terminal devices worldwide were connected to the Internet. Last year, the industrial scale of China's Internet of Things technology has exceeded 750 billion yuan. It has been applied in security, transportation, medical, power, agriculture, forestry, environmental protection, finance and other fields, and is expected to become the next trillion-level information in 2017. Technology industry.

However, with the continuous advancement and application of the Internet of Things, its security issues have become increasingly prominent.

Recently, the United States has become known as the world's first network 瘫痪 event that uses IoT devices for large-scale ddos ​​(distributed denial of service) attacks. As many as 100,000 IoT devices are infected with "future" viruses, which use network resources to send communication requests, resulting in large-scale network paralysis on the east coast of the United States and parts of Europe.

"The US attack shows that in the Internet of Things era, every networked device, system or terminal application may become an attacking source, an attack target or an attacker's accomplice." Li Shoupeng, deputy director of China Information Security Evaluation Center, told the author.

“Development” and “safety”

According to He Dequan, an academician of the Chinese Academy of Engineering, the current Internet of Things is developing rapidly, but security issues are frequent, and even threats to security continue to grow. These are caused by insufficient consideration of the security of the Internet of Things.

“The top design and agreement of the country when it started to develop the Internet of Things is doing very well, but the 'development' and 'safety construction' of the Internet of Things are like the two wheels of the car. Only when they cooperate with each other can they travel smoothly and find between them. The balance point is crucial," He Dequan said.

He Dequan believes that the Internet of Things, as a system that is more complex and diverse than the Internet and has a larger span size, needs to consider its security issues more in terms of its complexity and dispersion.

For example, in terms of transmission, the Internet only needs to grasp the front and rear ends of the transmission, and the entire life cycle of the Internet of Things transmission must be maintained; in terms of functions, the nodes of the Internet of Things not only must ensure data security, but also consider actions, Control security, etc.

Experts generally believe that most IoT architectures lack security authentication mechanisms, and the Internet of Things industry chain involves too many links. Massive terminals are vulnerable to real-time online attacks, and there is a lack of an overall framework system for policy management and standards development. The current cause of frequent Internet security incidents.

Is “simplification” feasible?

However, "although the security of the Internet of Things is not good at this stage, in the long run, the security of the Internet of Things will be better than the Internet." yiftachcohen, Director of Global IoT Software R&D, Israel Jiebang Security Software Technology Co., Ltd., interviewed by the author Said.

"Complicated multi-factor systems like the Internet of Things can be handled by 'simplification'. Western network security companies have also proposed ways to solve the Internet of Things problem with 'simplified' ideas, and have reached a certain consensus." He Dequan said.

Cohen expressed a similar view to He Dequan. He believes that for the Internet of Things, engineers need to be designed to ensure the uniqueness and security of the IoT device to the cloud link, and then open the cloud to the user, that is, focus on end-to-end confidentiality, using lightweight passwords. Simplified method.

"Simplification may increase the vulnerability of cyberattacks, but if you count the accounts, at least the asymmetry of 'attack' and 'defense' can be reduced, and the investment in security will be less." He Dequan said.

Experts also said that the localization of microelectronic devices such as IoT devices, the sustainability of policies, the implementation of safety standards and regulations, and security legislation are also key to solving the security problems of the Internet of Things.

"For the foreseeable future, the Internet of Things will be a key area for security issues and network security governance. We will work together in politics, enterprises, and research institutions to strengthen technical support capabilities while also preventing problems before they are established. The IOT information security major incident response mechanism enhances event processing capabilities." Huang Dianzhong said.

Editor in charge: Li Jin

Bedside Table

Bedside Tables are unsung heroes of the night, keeping your books, alarm clock and glass of water within fumbling distance. Ours come in different styles and match our beds and other Bedroom Furniture. Some have doors or drawers to hide your current bestseller from borrowers and all have prices that won`t disturb your sleep.

Give your bedside instant style with our bedside table. The sleek mid-century modern design features crisp lines.

Bedside Table,Bed Table,Bed Side Table,Bedside Drawers

Baklam , https://www.baklamfurniture.com

Posted on