Ensuring Network Reliability and Security in the Face of IoT Challenges
May 31, 2016

Mandana Javaheri
Savvius

Share this

2015 was a banner year for hacking. Security researchers demonstrated that it is possible to remotely hack and control vehicles, hack a pacemaker (thankfully it was in a medical dummy), steal Gmail credentials from a smart fridge and even hack a Barbie doll. As if the traditional security vulnerabilities presented by modern technology weren’t challenging enough, the widespread adoption and use of IoT devices have ushered in more potential security traps and new performance challenges that were not concerns a few years ago.

If we divide IoT security by platform, we are looking at cloud management security, network security, and end-point security. Our focus here is ensuring network reliability and security.

Maintaining network performance, reliability and connectivity while minimizing network latency is difficult for IoT devices. Most early IoT devices were not built with network load or security in mind, and their high rate of adoption has caused some unintended problems. The number and nature of these devices, the amount of information they send over their networks, the number of connections and the 24x7x365 nature of their activities present unique challenges. These include:

Mobile Device Management (MDM)

As individuals and enterprises add more devices to the IoT, it becomes more difficult to manage them individually, creating the need for more and better device management services. Because most device management services are cloud based, the communications between them and the devices that register with them are going through the Internet, and are visible to hackers. And although MDM helps to address the serious problem of managing devices, it also creates more opportunities for hackers to access the devices by masquerading as the management service, or even hacking into the service and accessing the device from the service itself.

Identity Management

Because people use so many sites, it becomes painful to register for each one individually. It takes time. And who can remember all those passwords? As more services offer social media login from Facebook, LinkedIn, Twitter, and other major sites, it becomes easier for hackers to gain access to all of a person’s services through a single login. And even if you do register individually, you have so many passwords, you probably keep them in a file somewhere. Hackers love that.

Remote Device Monitoring

Like any other device, IoT devices need to be monitored for performance, reliability, and security. And like MDM, most monitoring services are in the cloud, meaning the monitoring data is traveling over the Internet, which is not only another opportunity for hackers to access the devices being monitored, but even the monitoring data itself can be used by hackers to find out more about the devices, the networks they are on, and the people using them.

Network Routing

As the IoT gets bigger, it will have to continuously grow with more hardware and software. Each piece of hardware and software is an attack target for hackers. And as new hardware and software become available, there will be new vulnerabilities that hackers will find and exploit, and developers will have to patch. Yes, it is a vicious cycle.

Freedom vs Security

As the IoT becomes more central and necessary to the lives of everybody on this planet, more and more laws will be passed to protect the people who use it from hackers. This raises the age old question about whether the security through legal policy is worth giving up the civil liberties and privacy protection required to achieve it. Remember Braveheart!

The challenges that IoT devices now present shouldn’t come as a surprise. The Internet of Things has only gained real momentum in the past two or three years, so it isn’t realistic to expect two decades of security and networking expertise to be incorporated overnight.

Fortunately, there are a few effective ways to monitor these networks. Although IoT devices are different from normal end-points, you can still monitor device activity, status, connectivity, potential vulnerabilities, unauthorized access, performance metrics and more using network performance monitoring tools. If you have a solution capable of providing visibility into IoT, you can create a baseline for your IoT devices over time to identify anomalies more easily. An in-depth understanding of “normal” network activity levels greatly helps with troubleshooting and identifying network issues and security risks.

While we enjoy IoT devices and everything they enable in our day-to-day lives, visibility is critical to ensure network reliability and security 24x7x365.

Mandana Javaheri is CTO of Savvius.

Share this

The Latest

May 23, 2019

The first word in APM technology is "Application" ... yet for mobile, apps are entirely different. As the mobile app ecosystem is evolving and expanding from pure entertainment to more utilitarian uses, there's a rising need for the next generation of APM technology to stay ahead of the issues that can cause apps to fail ...

May 22, 2019

For application performance monitoring (APM), many in IT tend to focus a significant amount of their time on the tool that performs the analysis. Unfortunately for them, the battle is won or lost at the data access level. If you don’t have the right data, you can’t fix the problem correctly ...

May 21, 2019

Findings of the Digital Employee Experience survey from VMware show correlation between enabling employees with a positive digital experience (i.e., device choice/flexibility, seamless access to apps, remote work capabilities) and an organization's competitive position, revenue growth and employee sentiment ...

May 20, 2019

In today's competitive landscape, businesses must have the ability and process in place to face new challenges and find ways to successfully tackle them in a proactive manner. For years, this has been placed on the shoulders of DevOps teams within IT departments. But, as automation takes over manual intervention to increase speed and efficiency, these teams are facing what we know as IT digitization. How has this changed the way companies function over the years, and what do we have to look forward to in the coming years? ...

May 16, 2019

Although the vast majority of IT organizations have implemented a broad variety of systems and tools to modernize, simplify and streamline data center operations, many are still burdened by inefficiencies, security risks and performance gaps in their IT infrastructure as well as the excessive time it takes to manage legacy infrastructure, according to the State of IT Transformation, a report from Datrium ...

May 15, 2019

When it comes to network visibility, there are a lot of discussions about packet broker technology and the various features these solutions provide to network architects and IT managers. Packet brokers allow organizations to aggregate the data required for a variety of monitoring solutions including network performance monitoring and diagnostic (NPMD) platforms and unified threat management (UTM) appliances. But, when it comes to ensuring these solutions provide the insights required by NetOps and security teams, IT can spend an exorbitant amount of time dealing with issues around adds, moves and changes. This can have a dramatic impact on budgets and tool availability. Why does this happen? ...

May 14, 2019

Data may be pouring into enterprises but IT professionals still find most of it stuck in siloed departments and weeks away from being able to drive any valued action. Coupled with the ongoing concerns over security responsiveness, IT teams have to push aside other important performance-oriented data in order to ensure security data, at least, gets prominent attention. A new survey by Ivanti shows the disconnect between enterprise departments struggling to improve operations like automation while being challenged with a siloed structure and a data onslaught ...

May 13, 2019

A subtle, deliberate shift has occurred within the software industry which, at present, only the most innovative organizations have seized upon for competitive advantage. Although primarily driven by Artificial Intelligence (AI), this transformation strikes at the core of the most pervasive IT resources including cloud computing and predictive analytics ...

May 09, 2019

When asked who is mandated with developing and delivering their organization's digital competencies, 51% of respondents say their IT departments have a leadership role. The critical question is whether IT departments are prepared to take on a leadership role in which collaborating with other functions and disseminating knowledge and digital performance data are requirements ...

May 08, 2019

The Economist Intelligence Unit just released a new study commissioned by Riverbed that explores nine digital competencies that help organizations improve their digital performance and, ultimately, achieve their objectives. Here's a brief summary of 7 key research findings you'll find covered in detail in the report ...