Historical Data Helps Internet of Things Resist Hacks
May 10, 2017 | A*STAREstimated reading time: 2 minutes
The power of big data is used in a strategy developed by A*STAR to improve the security of networks of internet-connected objects, known as the Internet of Things (IoT), technology which will make everything from streetlights to refrigerators "smart."
More than 20 billion devices are expected to be upgraded and connected to each other by 2020. However, with IoT becoming increasingly widely adopted, developers need to guarantee its security. One hacked target could be the gateway to other parts of the network, making it vulnerable to breaches of sensitive information. This was demonstrated in October 2016, when a huge attack on IoT devices across Europe and the USA, such as CCTV cameras with easy-to-guess passwords, contributed to outages for several major websites.
Currently, a number of web services, including online banking and Google, use or offer a two-step authentication process to increase the security levels. Since passwords can be leaked or cracked, these services require secondary secret information from the customer. This could be another code transmitted via SMS, email or a security token; or the user’s fingerprints or facial recognition.
However, the direct application of these methods to the IoT is not practical. “We want to achieve the same level of security as bank servers offer, but the resources needed are simply an overkill to typical IoT devices, “explains Jun Wen Wong, one of the researchers involved in the study. “We had to think about a brand new protocol.”
The new strategy, devised by A*STAR researchers of the Institute for Infocomm Research, uses the conventional password as first step for authentication, but a second step uses the whole history of the data exchanged between the IoT device and the server.
The scientists proposed algorithms that generate and store in the IoT device a very small piece of secret information, which can concisely represent the whole history dataset, and can be retrieved for the authentication. Thanks to this approach, taken from the big data sector and originally applied to the IoT, this security two-step system can be compatible with IoT devices with low computation and small memory.
Using the data exchanged between the device and the server has very interesting leakage-resilience properties. As data are constantly generated by the IoT device and sent to the server, the history dataset is growing, so hackers would have to steal a considerable amount of data over an extended period of time, becoming more open to detection.
Suggested Items
Gartner Survey Finds 61% of Organizations Are Evolving Their D&A Operating Model Because of AI Technologies
05/01/2024 | Gartner, Inc.Sixty-one percent of organizations are forced to evolve or rethink their data and analytics (D&A) operating model because of the impact of disruptive artificial intelligence (AI) technologies, according to a new Gartner, Inc. survey.
Real Time with… IPC APEX EXPO 2024: Operational Excellence and Smart Factory Initiatives
04/30/2024 | Real Time with...IPC APEX EXPOOperational excellence and operational efficiency are defined in this interview with Koh Young General Manager Joel Scutchfield. He touches on automation, AI, and collaboration as solutions to resource limitations. Koh Young's data-driven approach uses AI for process adjustments, data analytics, and supply chain enhancements. The discussion underscores the shift toward smart factory initiatives and the future of manufacturing, with a focus on reshoring, nearshoring, and technology utilization.
IDTechEx Report on Quantum Technology: Nano-scale Physics for Massive Market Impact
04/30/2024 | PRNewswireThe quantum technology market leverages nano-scale physics to create revolutionary new devices for computing, sensing, and communications. Across the industry, quantum technology offers a paradigm shift in performance compared with incumbent solutions.
NASA’s Optical Comms Demo Transmits Data Over 140 Million Miles
04/30/2024 | NASA JPLNASA’s Deep Space Optical Communications experiment also interfaced with the Psyche spacecraft’s communication system for the first time, transmitting engineering data to Earth.
Real Time with… IPC APEX EXPO 2024: Insight into Summit Interconnect's Success
04/30/2024 | Real Time with...IPC APEX EXPOShane Whiteside, CEO of Summit Interconnect, discusses the company's recent recognition as one of the best PCB fabricators in the industry by receiving IPC's Peter Sarmanian award. Whiteside touches on the impact of changes in the marketplace, such as the Defense Production Act and presidential determination, on their growth. Whiteside also shares the company's focus on mechanical and data automation to enhance manufacturing processes and anticipates more automation and evolution in the industry.