IoT Is Still Centralized And Vulnerable, What’s The Solution?

 | Dec 04, 2018 10:48PM ET


In 2018, the Internet of Things market has seen the total number of IoT devices that are in use rise to seven billion. According to iot-analytics , this figure is expected to increase threefold by 2025. Despite such indicators, the Internet of Things still has to solve problems regarding centralized platforms’ vulnerability.

IoT platform as a bottleneck

The complexity of cyber-physical systems is rising. Autonomous machines are becoming able to make their own decisions based on a set of accumulated data about a company or customer. Therefore, there is an emerging issue with how to ensure data integrity. The data subject’s location, financial data, and information relating to personal life may end up in the hands of people or companies acting in bad faith. Linking data and accounts to one’s smartphone also carries a threat. Access to IoT – be it to the washing machine or the garage lock – is usually tied to one handy device which can be stolen or lost.

Examples of Major Challenges

As the Internet of Things collects huge amounts of data, storing this data in a centralized way in itself remains one of the major challenges. As an example of the consequences of storing customer data’ insecurely, iot-analytics provides a case with a UK based telecom and internet provider that was subjected to several cybersecurity breaches where customers’ data was exposed. Hackers were able to easily access and steal millions of customers’ credit card and bank details during a sustained cyber attack.

In September of this year, a big leak by a Brazilian online booking system exposed personal data of almost 500,000 people. A month later, what appeared to be a collection of personal records compiled by the Federation of Industries of the State of Sao Paulo, the largest class entity in the Brazilian industry representing around 130 thousand industries in various sectors was exposed. The records reportedly contained the personal details of Brazilian citizens such as: names, personal ID numbers, full addresses, emails and phone numbers.

We have to keep in mind that IoT is still reported that millions of sleep apnea patients rely on breathing machines to get a good night’s rest and the provision of such machines has become common practice in the insurance industry. One of the patients discovered that the device helping him breathe at night was also spying on him. As it turned out, the machines were tracking when the patients were using them and sending the information not just to their doctors, but to the health insurer too.

So what gives?

What facilitates vulnerable data accumulation that can easily fall into wrong hands?

Imagine a coffee machine, a fridge and a toaster all controlled by their owner via an app. The current state of things allows these devices to be interconnected. The coffee maker is programmed to get milk from the fridge. Afterward, it sends signals to the toaster which starts heating up five minutes after the coffee machine switches on.