Every last chip counts as how all IoT devices can be protected from attacks and threats

The internet of things [IoT]) is a technology that arose thanks to the development of computer networks and the ability to implant electronic devices more easily in everyday objects due to lower space and resource costs. This emerging technology has made it possible to manipulate objects in our home using computers and electronics. The idea of ​​connecting certain devices such as devices together and automating tasks sparked a boom in which several manufacturers developed many smart devices and expanded the functionality of objects that previously could not be improved, and that is, no one thought that we could make coffee. from our cell phone.

This had a very important drawback, just as important as protecting against cyberattacks. Many devices lacked security patches and had a large number of security vulnerabilities.

The world of IoT has a variant called IoMT (Internet of Military Things) or Internet of Military Things. Nowadays this is a complex network of interconnected things, but with more advanced purposes like coordinated intercommunication, there is IoMT machine learning in myriad devices, but they are not that commonplace. IoMT differs from civil IoT in that the devices are not simple household appliances, but rather sensor networks, object recognition systems and radar devices. In short, IoMT goes a step beyond civil IoT.

These devices (both IoT and IoMT) share the aforementioned problems. The development of the Internet in general has made great strides in both computer attacks and defense. The problem is that the most primitive (and vulnerable) IoT devices do not have an update system defined or are very precarious with which to apply security patches and generate an active defense mechanism against the various attacks they receive. As soon as the attacks made the situation unsustainable, the development of protection techniques for the above systems began.

Firewalling was a very effective technique. Most operating systems these days have one, even if it’s extremely simple. This is one of the most important and fundamental defenses that can be associated with a device.

The firewall’s trick is to use a device outside of the IoT target (or IoT targets) to defend and generate a specific firewall to cover it. For this purpose it could be implemented in the IoT network to be defended, in case it is a large organization or a server is working with a large number of computers, and in the most minimalistic case use a raspberry pi. With firewalling, we can create a white list, or better known as a list, that stores the only devices that can connect to IoT devices.

Another technique that can provide security assistance is network traffic sniffing. These techniques can be used to develop filters that are robust enough to analyze the packets transmitted through the network and discard malicious ones in real time. Over time, it will even be possible to train a neural network that generates artificial intelligence that automates the process with a high degree of effectiveness.

When firewall and packet filtering techniques are combined, the connectivity of vulnerable devices can be restricted, making it less likely that an attacker will take control of our device. Packet filtering, on the other hand, protects certain parts of the malicious code from execution or the establishment of encapsulated connections, which further protects the devices.

However, it is important that the device manufacturers themselves strive to set up support systems and ways to patch the devices themselves, as security is drastically simplified if the device itself starts in a secured state. (Efrn Varn, DLTCode)

Copyright © Grupo Edefa SA Reproduction, in whole or in part, of this article is prohibited without the prior authorization of the publisher.

Back to top button