Aleksander Poniewierski
Jaspreet Singh
By 2020, there will be more than 20 billion devices connected to the Internet of Things (IoT), according to Gartner — that’s roughly 2.5 devices for every single person on the planet. And that’s just the beginning of what is swiftly becoming an explosion in connectivity, which could result in virtually every household item and all industrial electronic equipment being capable of exchanging data with other devices.
We already rely on IoT on a daily basis, but this ecosystem will become even more indispensable in the future. Not only will it enhance quality of life for individuals — allowing us to control our homes with just a swipe on our smartphones, for example — it will allow companies to create new business models and to be more proactive in how they maintain their assets and equipment.
And, in India, which suffers from congestion in many urban areas, IoT can act as a platform for smart cities by empowering local authorities to effectively manage traffic and to reduce noise and pollution.
Security risks
Broadly speaking, IoT is great news for society as a whole, but, like all emerging technologies it fuels emerging risks. We need to understand these risks if we are to manage them and to help ensure that the technology is used as a means to achieve positive progress. Primarily, we have identified four main risks that require careful consideration and the implementation of strict cyber-security controls.
The first, most obvious, threat is the risk of an IoT network being hacked, with potentially devastating results. Just think of the human and physical damage that a hacker could inflict by taking control of a self-driving car, for example. Security should be a fundamental pillar of any IoT network, and it should be in place from the outset.
We must learn from the early days of the internet, when design, functionality and experience took precedence over security, for which the cost was deemed to undermine the business case. Similarly with IoT, taking short-cuts in security at the early stages will only lead to businesses having to make expensive reparations later, provided they manage to survive a breach and uphold their reputation.
Secondly, testing IoT infrastructure presents a significant risk. The nature of the technology means that IoT is currently being implemented in a fairly agile way, with new devices and sensors being introduced on an ad-hoc basis and people experimenting as they go along. In the past, the rollout of new technology would only have been undertaken once thorough testing of an entire solution had been completed.
With IoT, however, the infrastructure is not being tested at all — rather, it is being honed and fine-tuned in a “live” setting. What’s more, no one is necessarily checking that the data sent by the sensors on different devices is actually accurate. Instead, people tend to assume that the sensors are properly calibrated and the information they provide is secure and correct.
Having accurate data is critical in an environment in which machines are talking to other machines and making decisions without interacting with humans. Organisations should use tools like artificial intelligence (AI) and statistical analysis to identify those sensors that are producing accurate data, and those that are not.
Furthermore, IoT is giving rise to new privacy issues that need to be addressed. Consumers need to be aware of the data being generated that relates to them and how it is being used. Significantly, they may have no control over the interaction between devices that communicate information automatically, including their own.
Privacy issues
When fragmented data is collected and analysed from multiple end points, the possibility of it remaining anonymous is highly unlikely. What’s more, it may yield sensitive information. When they sign up for services, customers should therefore be mindful of the data permissions they are granting and push vendors for transparency.
Lack of awareness around privacy controls may expose customers’ personal data so it can be used for unauthorised purposes. In addition, IoT devices generate a lot of unstructured data; any data analysis conducted on this raw data could generate an inaccurate representation of the individual and reflect incorrect behavioural patterns.
Machine dependency
Finally, human behaviours and social engineering are major risk factors in an IoT environment. Take traffic lights, for example.
We all know that red means stop, yellow means wait and green means go. What would happen if someone were to turn all the traffic lights in a smart city to green?
Would people stop and think, or would they just keep driving? It is clear that, just as infrastructure needs to be protected from cyber threats, people need to be educated so they are able to challenge algorithms generated by machines that are responding to incorrect information.
Ultimately, cyber-security controls can be perceived just as a means for resisting threats, or they can be viewed as a catalyst for transforming IoT into an ecosystem like that adopted by the airline industry.
Safety, standards and regulation have all evolved since the industry first got off the ground in the 1920s, which may be why air travel is the safest way to travel today. If we implement IoT security with the same level of vigour that the airline industry applies to safety, the technology will engender trust and drive the creation of new businesses and industries.
India is at a nascent stage when it comes to IoT, and adoption is slow compared with the rest of the globe.
Many Indian organisations are still content with legacy IT over cloud infrastructure, making IoT a low priority in terms of changing business processes.
Nevertheless, the government’s ‘Digital India’ and ‘Smart Cities’ initiatives are accelerating India’s journey towards adopting digitalisation. On this journey, it is imperative that adequate measures are taken to secure the IoT ecosystem, and to prepare organisations to unleash the full potential of IoT by mitigating the associated governance, privacy and security risks.
The authors are EY Global Internet of Things Leader and Information Security Partner, EY India, respectively. The views do not necessarily reflect those of the global EY organisation or its member firms.
Comments
Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.
We have migrated to a new commenting platform. If you are already a registered user of TheHindu Businessline and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.