Home Business IT Security Lack of security could dampen IoT deployments

IoT security isn't a done deal, but blockchain technology may be able to assist.

"We cannot have an IoT ecosystem without security we can trust," CA Technologies chief technology officer Otto Berkes told iTWire.

There have already been examples of cars being hacked (despite the 2014 warning from QUT professor Andry Rakotonirainy that this was a possibility), and the problem becomes even more serious as autonomous vehicles become an everyday reality.

The problem might be less spectacular in other areas, but that does not mean it is less significant.

Berkes said the issue would become even more important as the density of connected devices increases and the distance of control increases. The latter point refers to the situation where rather than one system — possibly with a human operator  giving instructions to a device, a device asks another to help perform a task, and that one asks another, and so on.

"In my mind, it's a form of distributed complexity," Berkes said. "We need to be confident that all communications are secure, and that the devices are reliable and act in a predefined way."

While various technologies exist to address these matters, the attack surface is increasingly non-linearly so any vulnerabilities are likely to be discovered, potentially by the Bad Guys.

"Heterogeneity is a challenge" as standards for communications protocols and other aspects are still emerging. But he praised those who drove the adoption of IPv6, because "this is the use case" that requires it.

IoT represents "one of the most interesting applications of blockchain technology," according to Berkes, as it could allow the creation of a ledger as transactions (eg, commands) are passed between devices and are processed. This would allow verification that the data added to the chain is correct.

While devices have limited compute power and other resources, there are lightweight algorithms that are suited to this purpose, he said. "We've seen an explosion of blockchain technologies" addressing different uses.


With 50+ Speakers, 300+ senior data and analytics executives, over 3 exciting days you will indulge in all things data and analytics before leaving with strategic takeaways that will catapult you ahead on your journey

· CDAO Sydney is designed to bring together senior executives in data and analytics from progressive organisations
· Improve operations and services
· Future proof your organisation in this rapidly changing technological landscape
· CDAO Sydney 2-4 April 2019
· Don’t miss out! Register Today!
· Want to find out more? Download the Agenda



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.


Popular News




Sponsored News