{"id":2121,"date":"2019-12-09T01:15:04","date_gmt":"2019-12-09T01:15:04","guid":{"rendered":"http:\/\/kusuaks7\/?p=1726"},"modified":"2024-02-13T11:06:16","modified_gmt":"2024-02-13T11:06:16","slug":"iot-a-danger-of-the-future","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/iot-a-danger-of-the-future\/","title":{"rendered":"IoT a Danger of the Future"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2121\" class=\"elementor elementor-2121\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-738aa21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"738aa21\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-597bf762\" data-id=\"597bf762\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a315be elementor-widget elementor-widget-text-editor\" data-id=\"5a315be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis article is a review of a very important topic that I believe was not enough to say so far so I decided to look at this topic a bit.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5275ee5 elementor-widget elementor-widget-heading\" data-id=\"5275ee5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>What is IoT?<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a79edd elementor-widget elementor-widget-text-editor\" data-id=\"3a79edd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis shortcoming was first used in 1999, at the peak of the dot-com balloon, to describe the network to which all things will be connected (originally conceived, using RFID technology). However, a dot-com balloon shot and the story of connecting all things died. However, by developing 3G and then 4G mobile networks as well as developing network technologies that have become cheaper and more resource-efficient today, you can use many devices over the network. Based on all of the above we can conclude that IoT is essentially any device that communicates over a network, wire, wi-fi or mobile. Today, billions of devices are an integral part of the Internet of Things platform and use built-in hardware and software to send and receive data across various communication protocols. Many dreams about \u201csmart homes\u201d where each device will function automatically and make life easier for us.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72bb4a3 elementor-widget elementor-widget-heading\" data-id=\"72bb4a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>And now a little more technical<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e01f495 elementor-widget elementor-widget-text-editor\" data-id=\"e01f495\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInternet of Things (IoT), also called the Internet of Everything (IoE), is made up of all the devices that can connect to the network and collect, send and function according to data collected from the environment using built-in sensors, processors and hardware communication. These devices, commonly referred to as \u201cconnected\u201d or \u201csmart\u201d, may sometimes \u201ctalk\u201d with other connected devices, in a process called machine-to-machine (M2M) communication, and work on the data obtained from one of other. But not all that great is probably the biggest challenge for IoT in the security field.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-628617e elementor-widget elementor-widget-heading\" data-id=\"628617e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>What is the biggest problem with IoT?<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-236c734 elementor-widget elementor-widget-text-editor\" data-id=\"236c734\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe first obvious thing is that we have come to our home to be endangered because we now have a lot of these devices in the home that can be easily misused as we have seen in the past couple of years.\u00a0 What is even more important is that there are IoT devices that we carry with us all the time and which can also be misused for various purposes. In addition to this, another great threat is smart toys for children who have a microphone, camera, and GPS in the room, and can, therefore, be abused, and the FBI also warned parents. If we look at business users and some things are complicated because today in industry 4.0 we have a large number of IoT devices that can also be abused and make huge financial damage to the company.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34512ce elementor-widget elementor-widget-heading\" data-id=\"34512ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Who should take care of the security of the IoT device?<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9ddfb7 elementor-widget elementor-widget-text-editor\" data-id=\"a9ddfb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe greatest role in creating security of the IoT environment should be the manufacturers of such devices themselves, which is not the case today. We need to have a little understanding for them as they are in a completely different industry and security is one of the last things they have not encountered so far and the functionality of the devices themselves is at the forefront. Also, such firms generally do not have people employed to deal with this issue, which is a great cost to them because experts in this field are now expensive and looking for companies.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f7e7f4 elementor-widget elementor-widget-text-editor\" data-id=\"3f7e7f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<b>What is needed to improve?<\/b>\n<ol>\n \t<li>The first thing that would be needed is the process of automatic updating of software on IoT devices (this was once a problem with smartphones where it was unthinkable that such devices are updated regularly and today we consider it quite normal).<\/li>\n \t<li>The second thing is to take into account the implied user names and passwords for access to IoT devices, as it is commonly known that they are often used as a preconfigured order and password such as admin and more.<\/li>\n \t<li>The third thing is to take account of how to store user data on IoT devices, even though these hardware weak devices should consider how and where data is stored.<\/li>\n \t<li>The fourth thing is to introduce minimal cryptography to protect the transfer of data and protocols between the IoT devices (however, the biggest problem in the whole story is the lack of CPU power and memory on IoT devices, so it is necessary to develop and use less demanding algorithms)<\/li>\n \t<li>The fifth thing is the adoption of a unique operating system like IncludeOS which, unlike the Linux system, is now largely used much better by the resources of the device and has a much smaller attack surface because it is a type system.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aea1507 elementor-widget elementor-widget-heading\" data-id=\"aea1507\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2>Conclusion<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5f148a elementor-widget elementor-widget-text-editor\" data-id=\"c5f148a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhat if the manufacturer did not do anything about the known security bug?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40e1245 elementor-widget elementor-widget-text-editor\" data-id=\"40e1245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt would be logical if such a device returned to the manufacturer with the money you paid when you bought it. Imagine that your car has braking problems that the manufacturer can not afford, it would be quite logical for such a car to be replaced or to return the money. Unfortunately, there will be a lot of problems here, especially with a large number of producers from China, who in some markets do not even have authorized service and sales staff.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Is IoT a danger of the future? There are IoT devices that we carry with us all the time and which can also be misused for various purposes. If we look at business users and some things are complicated because today in industry 4.0 we have a large number of IoT devices that can also be abused and make huge financial damage to the company.<\/p>\n","protected":false},"author":685,"featured_media":2992,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[3475],"class_list":["post-2121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":3475,"user_id":685,"is_guest":0,"slug":"alen-ibric","display_name":"Alen \u0130bri\u00e7","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_7b9fc7fb-1f17-4554-9f19-b942b50e055c-150x150.jpg","user_url":"http:\/\/www.bilkent.edu.tr\/","last_name":"\u0130bri\u00e7","first_name":"Alen","job_title":"","description":"<a href=\"http:\/\/alenibric.com.tr\/\">Alen \u0130bri\u00e7<\/a> is Senior Computer Engineer at Bilkent University, Turkey."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/685"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2121"}],"version-history":[{"count":6,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2121\/revisions"}],"predecessor-version":[{"id":35979,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2121\/revisions\/35979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/2992"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2121"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}