The day is not far when virtually all the
electronic devices from phone to cars from
refrigerators to light switches will be
connected to internet and will create a huge
network of communication to make our life
easier. But are we really prepared for this?
Are we prepared
for IoT?
Rathoud, Sameer
If futurists are right, we are going to enter
in an era where all the physical objects we
interact with on our daily basis, will gather
the data through sensors, connect to
internet and communicate with each other
through the buzzword and sci-fi movie worth
concept Internet of Things (IoT).
Optimist believes soon these daily usable
object will become intelligent and will make
our life easy. Tomorrow a refrigerator may
suggest you a recipe by looking at the
content in it. A light may get dim when you
are feeling sleepy. Your shoes may monitor
your health and suggest how much calorie
you should burn or even may be your shoes
will tell, how much calorie your friend has
burned. Your dress will monitor your health.
Our highways will be safer. Our house will be
more efficient. And may be every single idea
will become true with IoT tomorrow.
With IoT the devices will be connected to
various sensors. Through these sensors they
collect lot of data, analyze these data and
provide suggestion or take some action
based on the conclusion of data analysis.
But there might be the chances that the data
captured by these intelligent devices or data
flowing across the internet are highly
sensitive and private and by considering
privacy and security as stand these devices
provide a highly vulnerable point to hackers.
Instead of making our life easy as supposed
to be by these IoT devices, it can create
security havoc.
Few years back an incident came in notice,
where a malware worm named “Stuxnet”,
which was designed to attack industrial
programmable logic controller (PLC). PLCs
allow the automation of electromechanical
processes such as those used to control
machinery on factory assembly lines,
amusement rides, or centrifuges for
separating nuclear material. Exploiting four
zero-day flaws, Stuxnet functions by
targeting machines using the Microsoft
Windows operating system and networks,
then seeking out Siemens Step7 software.
Stuxnet reportedly compromised Iranian
PLCs, collecting information on industrial
systems and causing the fast-spinning
centrifuges to tear themselves apart.
Stuxnet’s design and architecture are not
domain-specific and it could be tailored as a
platform for attacking modern SCADA and
PLC systems.
Stuxnet reportedly ruined almost one-fifth
of Iran's nuclear centrifuges.
You can find more information on stuxnet at
http://en.wikipedia.org/wiki/Stuxnet.
Although this example is not directly
portraying the vulnerability of IoT data. But
with this example we can imagine how badly
a malware can hurt any program.
Take another example where an intelligent
cooking range is supposed to do some basic
pre-processing before I reach home. And a
malware in my intelligent device can even
influence my house’s fire safety and can
burn my house.
We can anticipate an attack of the things,
when new connected devices cause
problems on networks in a variety of ways
including increasing network attack surface
(every new "thing" is a potential hackable
weak point), using up precious bandwidth,
generating mountains of sensitive data that
needs to be stored and secured, and usable
IP addresses as billions of new things
connect to networks worldwide.
Capturing the data from our intelligent
device’s sensors will be ok, until I am not
providing the intelligence to the controllers
as well or our data security system for these
IoT devices should be sound enough that I
can rely on the actions of my controller as
well.
May be tomorrow I will be flooded with
suggestions from my IoT devices, but
preferably I would like to own the actions
rather than these intelligent devices do it for
me (at least for now).
I don’t want to be very pessimist and we can
choose to ignore the impending onslaught of
ubiquitous connected devices. While this
might be OK for now, we can’t keep our head
in the sand for much longer by just thinking
of a TRAP!

More Related Content

PPTX
Internet of Things
PPTX
Internet of things
PPTX
M phasis
PPT
Home Automation using IOT
PDF
Four ways to secure the internet of things - infographic
PPTX
Internet of things smart home
PDF
Threats & Benefits of Internet of Things
PPTX
Internet of Things- IOT 101 for beginners
Internet of Things
Internet of things
M phasis
Home Automation using IOT
Four ways to secure the internet of things - infographic
Internet of things smart home
Threats & Benefits of Internet of Things
Internet of Things- IOT 101 for beginners

What's hot (19)

PDF
IoT & Robotics Overview
PPTX
How IoT & Smart Home Automation Will Change the Way We Live
PDF
Internet of things
PDF
IoT meets Big Data
PPTX
Internet of things
PDF
The Internet of Things – Good, Bad or Just Plain Ugly?
PPTX
Create the Internet of Your Things with Microsoft Azure IoT
PPTX
Automatski - The Internet of Things - Security in IoT
PDF
IRJET- Smart Home Automation using IoT with Security Features
PDF
AI and Machine Learning for the Connected Home with Stephen Galsworthy
PPTX
Kuyashii p pt
PPTX
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
PPTX
Smart kitchen
PPTX
Internet of things for Smart Home
PPTX
IoT Security Middleware: evaluating the threats and protecting against them
PPTX
PDF
Iot presentation [bitheads]
PDF
A Quick Guide for Internet of Things - Apptunix
PDF
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IoT & Robotics Overview
How IoT & Smart Home Automation Will Change the Way We Live
Internet of things
IoT meets Big Data
Internet of things
The Internet of Things – Good, Bad or Just Plain Ugly?
Create the Internet of Your Things with Microsoft Azure IoT
Automatski - The Internet of Things - Security in IoT
IRJET- Smart Home Automation using IoT with Security Features
AI and Machine Learning for the Connected Home with Stephen Galsworthy
Kuyashii p pt
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Smart kitchen
Internet of things for Smart Home
IoT Security Middleware: evaluating the threats and protecting against them
Iot presentation [bitheads]
A Quick Guide for Internet of Things - Apptunix
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
Ad

Viewers also liked (19)

PDF
Caderno de oritenção metodologica
PDF
Úprava vody v bazénu
PPT
Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1
PDF
생명윤리기본법 초안 (2000년 초중반)
PPTX
Terapiadeaceptacinycompromiso
DOC
02 luat ban hanh van ban quy pham phap luat (dan)
PPS
8 M I N U T O S
ODP
Question 2
PPTX
Sản phẩm
PPTX
Periodic table
PDF
Hsk test 2012
PDF
Augere folder
PDF
Fiesta del miedo
PPTX
Індекс публічності 2014 Хмельницький
DOCX
PPT
Big data and you
PPT
Benh ly bang quang
PPTX
Dexter y dee dee. horacio german garcia
PDF
Policy+webinar+vn
Caderno de oritenção metodologica
Úprava vody v bazénu
Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1
생명윤리기본법 초안 (2000년 초중반)
Terapiadeaceptacinycompromiso
02 luat ban hanh van ban quy pham phap luat (dan)
8 M I N U T O S
Question 2
Sản phẩm
Periodic table
Hsk test 2012
Augere folder
Fiesta del miedo
Індекс публічності 2014 Хмельницький
Big data and you
Benh ly bang quang
Dexter y dee dee. horacio german garcia
Policy+webinar+vn
Ad

Similar to AreWePreparedForIoT (20)

PDF
Developing surveillance challenges in theinternet of things
PDF
A Survey Report on : Security & Challenges in Internet of Things
PDF
Smart city landscape
DOCX
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
PDF
Security Issues & Threats in IoT Infrastructure
PDF
Future Applications of Smart Iot Devices
DOCX
Internet of Things.docx
DOCX
Internet of things Seminar Reprt
PDF
Internet of Things, Examples and Issues
PDF
Simon Harrison RWE - Chain of Things 010616 final
PPTX
IoT.ppt
PDF
Internet of Things - Privacy and Security issues
PPTX
Assign 1_8812814ctm.pptx
PPTX
IOT Introduction.pptx
PPTX
IOT UNIT I.pptx
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
PPTX
A Wake-Up Call for IoT
PDF
Embracing iot in the enterprise
Developing surveillance challenges in theinternet of things
A Survey Report on : Security & Challenges in Internet of Things
Smart city landscape
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
All The Things: Security, Privacy & Safety in a World of Connected Devices
Security Issues & Threats in IoT Infrastructure
Future Applications of Smart Iot Devices
Internet of Things.docx
Internet of things Seminar Reprt
Internet of Things, Examples and Issues
Simon Harrison RWE - Chain of Things 010616 final
IoT.ppt
Internet of Things - Privacy and Security issues
Assign 1_8812814ctm.pptx
IOT Introduction.pptx
IOT UNIT I.pptx
IRJET - Cyber Security Threats and Vulnerabilities in IoT
A Wake-Up Call for IoT
Embracing iot in the enterprise

More from Sameer Rathoud (8)

PDF
Platformonomics
PDF
Observer design pattern
PDF
Decorator design pattern (A Gift Wrapper)
PDF
Memory Management C++ (Peeling operator new() and delete())
PDF
Proxy design pattern (Class Ambassador)
PDF
Builder Design Pattern (Generic Construction -Different Representation)
PDF
Factory method pattern (Virtual Constructor)
PPTX
Singleton Pattern (Sole Object with Global Access)
Platformonomics
Observer design pattern
Decorator design pattern (A Gift Wrapper)
Memory Management C++ (Peeling operator new() and delete())
Proxy design pattern (Class Ambassador)
Builder Design Pattern (Generic Construction -Different Representation)
Factory method pattern (Virtual Constructor)
Singleton Pattern (Sole Object with Global Access)

AreWePreparedForIoT

  • 1. The day is not far when virtually all the electronic devices from phone to cars from refrigerators to light switches will be connected to internet and will create a huge network of communication to make our life easier. But are we really prepared for this? Are we prepared for IoT? Rathoud, Sameer
  • 2. If futurists are right, we are going to enter in an era where all the physical objects we interact with on our daily basis, will gather the data through sensors, connect to internet and communicate with each other through the buzzword and sci-fi movie worth concept Internet of Things (IoT). Optimist believes soon these daily usable object will become intelligent and will make our life easy. Tomorrow a refrigerator may suggest you a recipe by looking at the content in it. A light may get dim when you are feeling sleepy. Your shoes may monitor your health and suggest how much calorie you should burn or even may be your shoes will tell, how much calorie your friend has burned. Your dress will monitor your health. Our highways will be safer. Our house will be more efficient. And may be every single idea will become true with IoT tomorrow. With IoT the devices will be connected to various sensors. Through these sensors they collect lot of data, analyze these data and provide suggestion or take some action based on the conclusion of data analysis. But there might be the chances that the data captured by these intelligent devices or data flowing across the internet are highly sensitive and private and by considering privacy and security as stand these devices provide a highly vulnerable point to hackers. Instead of making our life easy as supposed to be by these IoT devices, it can create security havoc. Few years back an incident came in notice, where a malware worm named “Stuxnet”, which was designed to attack industrial programmable logic controller (PLC). PLCs allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet’s design and architecture are not domain-specific and it could be tailored as a
  • 3. platform for attacking modern SCADA and PLC systems. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges. You can find more information on stuxnet at http://en.wikipedia.org/wiki/Stuxnet. Although this example is not directly portraying the vulnerability of IoT data. But with this example we can imagine how badly a malware can hurt any program. Take another example where an intelligent cooking range is supposed to do some basic pre-processing before I reach home. And a malware in my intelligent device can even influence my house’s fire safety and can burn my house. We can anticipate an attack of the things, when new connected devices cause problems on networks in a variety of ways including increasing network attack surface (every new "thing" is a potential hackable weak point), using up precious bandwidth, generating mountains of sensitive data that needs to be stored and secured, and usable IP addresses as billions of new things connect to networks worldwide. Capturing the data from our intelligent device’s sensors will be ok, until I am not providing the intelligence to the controllers as well or our data security system for these IoT devices should be sound enough that I can rely on the actions of my controller as well. May be tomorrow I will be flooded with suggestions from my IoT devices, but preferably I would like to own the actions rather than these intelligent devices do it for me (at least for now). I don’t want to be very pessimist and we can choose to ignore the impending onslaught of ubiquitous connected devices. While this might be OK for now, we can’t keep our head in the sand for much longer by just thinking of a TRAP!