IoT Security Challenges In 2020 and Beyond

As we look ahead to this year and beyond, we can expect to see an explosion in numbers—think billions—with respect to 5G networks connecting Internet of Things (IoT) devices. The IoT will be a system of many millions of different types of devices for a multitude of applications. Such devices will communicate autonomously with each other and their users via the cloud.

We can expect to see mobile network operators (MNOs) implementing these new 5G standards in their networks to make the IoT a reality, and we will certainly witness a huge shift of enterprise computing function to the edge. You won’t have to rely on a data center—effectively, you will be able to put that in “next to” your workforce.

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

A 5G world is the services that IT can provide through software-defined networking (SDN) and the virtual network functions at the edge—the need for MNOs to be able to scale on demand for their users’ needs becomes much more important. From a security point of view, consumers will simply be able to turn on a firewall—no fuss, and they can click a button that is virtualized and on the edge of the network. This makes it much easier to deploy the latest security; it’s all virtualized and close to the end user.

The era of 5G should be a great thing because it will accelerate the use and development of real-time applications. But with all this increased data going through a device or through a pipeline, you will certainly need more control of that data, and you’ll need tools that allow IT departments to be able to control it—especially from a security perspective, but also from a performance perspective. A massive proliferation is expected in IoT devices, and they will all be feeding massive amounts of data to the edge. A huge problem here is that none of the current security protocols regarding the IoT are standardized, and this presents a massive security risk to the world of 5G.

Imagine all these connected having no security standard for how they secure and authenticate with each other. Telcos and infrastructure firms will no doubt praise 5G for a wide variety of industrial use cases. However, if 5G is to be used for crucial industrial processes—think actual business impact—then you face a potentially risky scenario: when you have industrial environments using out-of-date legacy technology, it’s a sure bet hackers will begin to target these environments, with potentially very damaging results.

Traditional security approaches against the most obvious attacks on security are insufficient. We need solutions that can enable IoT devices to learn and adapt to various threats dynamically, in order to be able to address them in a more proactive fashion. Machine-learning (ML) techniques could be employed that provide both intelligence and the ability to reconfigure assorted IoT devices. The integration of the IoT with big data and cloud computing presents new challenges, such as data analytics, integration and storage—not the least of which are privacy and security concerns regarding sensor-generated data from misuse, theft or unfortunate losses.

Perhaps blockchain will provide the answers. There are those who believe blockchain can undertake some of the challenges presented by IoT security, for which you have myriad distributed devices that work well with the decentralized nature of blockchain. There again, perhaps blockchain is initially better suited in helping to secure the integrity of data within connected devices. Artificial-intelligence (AI) solutions also offer tremendous potential here. With the current state of AI maturity, products that are carefully designed for specific use cases will be more effective than those offering a more blanket approach.

Could 2020 herald the first instances of real adoption of AI within industrial enterprises—more specifically, vertical use cases in the Industrial Internet of Things (IIoT) landscape? I think so. As we see the use of artificial intelligence growing and maturing, we should witness a more targeted use, making it more precise overall.

IoT devices, as well as their associated connections to networks and the cloud, remain a weak link in security. With an ever-growing volume of personal data that will need to be secured against attacks and theft, a more comprehensive approach to IoT security will be necessary, with solutions that manage challenges across all industry and business sectors.

If you have any questions about how we can help you optimize you protect your business against cyberattacks, contact us today to help you out with your performance and security needs.

*This article originally appeared in RFID Journal  on February 2, 2020

Latest Articles

Three Ways CISOs Can Combat Emerging Threats in 2025

73% of CISOs fear a material cyberattack in the next 12 months, with over three-quarters convinced AI is advancing too quickly for existing methods to combat it. But what can CISOs do to prepare for the coming wave – and access the resources they need to deal with this evolving threat landscape? To find out, […]

11th November, 2024
How Optimizing Kafka Can Save Costs of the Whole System

Kafka is no longer exclusively the domain of high-velocity Big Data use cases. Today, it is utilized on by workloads and companies of all sizes, supporting asynchronous communication between even small groups of microservices.  But this expanded usage has led to problems with cost creep that threaten many companies’ bottom lines. And due to the […]

Itay Tal Head of Cloud Services
29th September, 2024
Migrating Volumez RedHat VMs into Amazon Linux 2 for higher effective discounts rate of Saving Plan

A cloud data infrastructure company relied on extensive use of multiple instance types to test its products. But this made it difficult to optimize costs – a fact which had begun to impact their ability to scale the business.   The GlobalDots team helped the company identify and implement a new infrastructure configuration that both saved […]

Itay Tal Head of Cloud Services
19th September, 2024
How Yuki Achieved SOC 2 Compliance 6x Faster

Overview A fast-growing Snowflake optimization platform was missing out on customers because they didn’t have the right data security compliance. Through multiple consultations and extensive vendor-testing, the GlobalDots team selected a solution to provide both tech and human support, helping the company achieve SOC 2 compliance within just 3 months – and win new customers […]

Itay Tal Head of Cloud Services
16th September, 2024

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services