One-size-fits-all approach will not be enough to secure IoT: TCG

San Jose, California, June 27, 2019: Securing the Internet of Things (IoT) cannot be done with a one-size-fits-all approach. Every kind of connected object must be assessed individually, according to the Co-chair of Trusted Computing Group’s (TCG) Embedded Systems Work Group Steve Hanna.

Speaking on the second day of the Embedded Technologies Expo and Conference 2019, Steve delved on the issue of IoT devices security and highlighted how the increasing trend for greater connectivity puts everyday objects at risk of exploitation and makes mission critical systems in businesses and governments more vulnerable to attacks.

IoT devices security

He clarified that every device had to be handled according to its individual needs, advising against a one-solution-for-all-devices approach.

When you consider other security systems, for example a lock, what you would use for a front door is very different to what would be used for a bank or a government building because the scale of an attack would be much greater and more complex in the case of the latter,” he said. “The same is true for computers and embedded systems; when we think about security, we have to think about different levels that correspond to the level of risk.

The TCG is a not-for-profit organisation formed to develop, define and promote open, vendor-neutral, global industry specifications and standards for inter-operable trusted computing platforms.

Steve illustrated his point by comparing a baby monitor with a chemical plant – both of which are likely to become connected as standard in the near-future. For the latter, he pointed out, the impact of an attack could be as serious as an explosion which would ultimately endanger human life.

“While it is important to secure things like baby monitors, for example, to avoid the devices being used to eavesdrop on conversations, there is a price point that needs to be met as well – no one is going to spend thousands of dollars on a baby monitor and for the manufacturers, that means the security solution needs to be less expensive,” continued Hanna. “In the case of a chemical plant, the risk is much greater, the level of attack is likely to be more sophisticated and a serious amount of money could have been invested in carrying it out. As a result, the security measures need to be much more stringent,” he said.

Steve went on to explain that the customised security approach required by the IoT could be achieved using technologies that were available today. TCG’s security standards are all based on the concept of Trusted Computing where a Root of Trust forms the foundation of the device and meets the specific requirements of the device or deployment.

“TCG’s wide variety of security options provide the building blocks to create secure systems,” said Steve. “In the case of a chemical plant, industrial-grade discrete TPM hardware can be built in not just into the plant’s firewall but also into the control system. This will enable these systems to be monitored in real-time and for even sophisticated attacks to be identified and prevented. For devices which are less high-risk, TPM firmware can be created which has the same set of commands but is less rigorously secured and therefore more cost-effective. Finally, for very tiny devices that can’t afford TPM firmware, DICE offers a good alternative.”

Embedded Technologies Expo & Conference 2019 is currently on in San Jose, California, USA.

Image Credit: Embedded Technologies Expo and Conference 2019

 

Leave a Reply

Click here to opt out of Google Analytics