Internet of Trusted Things
Smart Watches, Smart Wearables, Smart TV, Smart House, Smart Safety, Smart Security, what is the difference and what are the prospects? What means Internet of Smart Things, Internet of Hacked Things and Internet of Trusted Things?
Internet of Things means more than an Internet connection of smart things. In the coming years, Internet of Things will be one of the most important technological trends. This means the importance of the security of the Internet of things in everyday life [1]. Internet of Things technologies can be used for network attacks [2]. It confirms the need to protect at all levels including user devices, network infrastructure, data security, VPN, cloud resources. Publications at open sources, i.e. github (for example this) and of security experts (for example this, and this) demonstrate the availability for test and use of such technologies for researchers and experimenters.
Consumer security systems
The following devices can be involved in security systems at smart house- IP cameras, DVRs
- Alarm systems, CCTV, DVRs
- Motion sensors, Smart home safety kits
Network infrastructure for network with IoT devices
IoT devices can be used not only for bots but like edge devices in monitoring and system audit functions. For example Warberry PI built for Pentests can be used for traffic monitoring [4]. But IoT devices are subjected to zero-day threats and require timely updates like the standard workstations. The level of security in protecting against network attacks depends on the devices, and the network architecture. Option of such architecture for devices on Microsoft platform is discussed for example here [6]. When building systems with IoT devices you need follow the following principles [8]- Persistant updating of the system
- Protection against malicious actions
- Regular audits
- Physical protection of IoT infrastructure
- Protection of credentials in the cloud
References
2. “Principles of botnet-based IoT-devices”, 18.01.2017, SecurityLab by Positive Technologies, in Russian)
3. “10 At-Risk Emerging Technologies”, POSTED ON MAY 9, 2016 BY CHRISTOPHER KING IN VULNERABILITY ANALYSIS
4. “WAR PI. GIAC (GCIH) Gold Certification” Author: Scott!Christie,scottochristie@gmail.com. Advisor:Christopher!Walker
5. “Service Assisted Communication” for Connected Devices. Clemens Vasters, February 9, 2014
6. Architecture of IoT-solutions on a real example. Alexandr Surkov, 18.12.2015, (in Russian)
7. How to choose the communication standard for the IoT network. 25.02.2016 (in Russian)
8. Safety in the IoT: comprehensive protection strategy. Microsoft, 18.11.2016, (in Russian)