Cyber Security in IOT
This Article Written by Trainee Mohammed Al-Salboukh From King Fahd University of Petroleum and Minerals #KFUPM
Evans stated that 50 billion connected things will be in use worldwide in 2020, started from 2016, there are more than 5.5 million new things got connected every day. (2011, p. 3)
Internet of things (IoT) systems is the interconnection between devices, sensors and embedded systems. The experts are expecting that the IoT will be the new coming trend that is going to change the world like the effect of the internet.
Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes , control our lights, thermostats, and locks and beef up the security of our homes—between a host of other things.
A real IoT home system network example
IoT devices have no built-in security; making them topmost targets for hackers. the reasons for that is that the devices haven’t came from one company; yet, there is no confident protocol to secure our IoT.
Since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.
The following are an important tips to secure the IoT network from hackers, intruders and viruses.
1- Change Your Router’s Default Settings
change your router’s factory-default name and password. The factory-given name could give away the make and model of your router, making it easier for hackers to access.
Note: avoid any kind of password that have your personal information, like your name, family name, date of birth.
2- Never provide sensitive information on a public network
As a rule of thumb, do not go online shopping while you are connecting to a public network, as someone could easily steal it.
3- Use Strong Passwords
Always use a combination of numbers, symbols, lowercase letters and uppercase letters.
Never use the name of a pet, location, birthday, or anything that could be tied to your personal information.
Never use the same password for multiple accounts.
Make your password as long as possible.
Don’t keep an electronic note of all your passwords (if that gets hacked, all your accounts are compromised!).
4- Update Your Devices Routinely
Since IoT devices weren’t created with spiffed-out security, it’s crucial to continually update them. Updating software ensures that you’re up to date on the latest antivirus and anti-malware countermeasures. They also help clear up any security flaws that slipped through the cracks in the older version of your device.
5- Enable two level of authentication
One of the robust ways of securing the data today is to set more than one level of authentication. Many companies like Google, Netflix, Facebook, and Twitter are allowing their user to set 2 or 3 ways level of authentication. If the hacker acquired the password, the system will detect an unusual location is trying to access the account; then, a verification email will be sent to the user.
Not all of these levels are set by default, some of them have to be set manually.
6- Embed brilliant Ai security ideas
Monitor the user activity, if there is an unusual activity that is going on the system is blocked and the 3 level authentication required to re-access the system.
Example of Ai system in the home: The Ai algorithm and database going to detect and taught the user usual activity, user usual time of sleep, usual time of coming home, or maybe the user’s typical way of movement In the home. Therefore the algorithm going to analyze the data it has collected from the user and decide the best option like firing the alarm system.
7- Disable UPnP Features
Universal Plugin and Play(UPnP) feature is there in almost all of IoT devices, which allow multiple devices to connect. For instance, your Alexa can pair with your smart lights to turn on and off via voice command. As convenient as this is, it also poses several security risks.
If a device is discovered by a hacker, it will be easy for him to access all the devices that are connected with it. Furthermore, since all the devices are connected, it makes it easy for a cybercriminal to dismantle the whole system. Luckily, most devices allow you to disable UPnP by accessing their settings.
Note: UPnP is enabled by default.
Evans, D. (2011). The Internet of Things How the Next Evolution of the Internet Is Changing Everything. Cisco Internet Business Solutions Group (IBSG), 1–11. Retrieved from https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Ghosh, A., Chakraborty, D., & Law, A. (2018). Artificial intelligence in Internet of things. The Institution of Engineering and Technology, 208–2018. doi: 10.1049/trit.2018.1008
Knight, I. (2018). Connecting Arduino to the Web. Apress. doi: 10.1007/978-1-4842-3480-8