{"id":2010,"date":"2019-06-06T18:31:40","date_gmt":"2019-06-06T18:31:40","guid":{"rendered":"https:\/\/www.tantraanalyst.com\/insights\/?p=2010"},"modified":"2023-02-06T04:36:33","modified_gmt":"2023-02-06T04:36:33","slug":"cellular-iot-device-security-is-as-important-as-infrastructure-security","status":"publish","type":"post","link":"https:\/\/www.tantraanalyst.com\/ta\/cellular-iot-device-security-is-as-important-as-infrastructure-security\/","title":{"rendered":"Cellular IoT \u2013 Device security is as important as infrastructure security"},"content":{"rendered":"<figure id=\"attachment_2009\" aria-describedby=\"caption-attachment-2009\" style=\"width: 702px\" class=\"wp-caption alignright\"><a style=\"color: #808080;\" href=\"http:\/\/bit.ly\/2K3Ptn1\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2009 size-full\" src=\"https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/06\/Cellular_IoT_Device_security_important_as_infrastructure_security_TantraAnalyst.jpg\" alt=\"IoT\" width=\"702\" height=\"336\" srcset=\"https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/06\/Cellular_IoT_Device_security_important_as_infrastructure_security_TantraAnalyst.jpg 702w, https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/06\/Cellular_IoT_Device_security_important_as_infrastructure_security_TantraAnalyst-300x144.jpg 300w, https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/06\/Cellular_IoT_Device_security_important_as_infrastructure_security_TantraAnalyst-700x336.jpg 700w, https:\/\/www.tantraanalyst.com\/ta\/wp-content\/uploads\/2021\/06\/Cellular_IoT_Device_security_important_as_infrastructure_security_TantraAnalyst-20x10.jpg 20w\" sizes=\"auto, (max-width: 702px) 100vw, 702px\" \/><\/a><figcaption id=\"caption-attachment-2009\" class=\"wp-caption-text\"><span style=\"color: #808080;\">RCR Wireless News, June 06, 2019<\/span><\/figcaption><\/figure>\n<h6><span style=\"color: #808080;\">As the awareness of the transformative nature of 5G is increasing, the industry is slowly waking up to the enormous challenge of securing not only the networks, but also all the things these networks connect and the vital data they carry. When it comes to the Internet of things (IoT), the challenges of security couldn\u2019t be bigger, and the stakes involved couldn\u2019t be higher. The spread of IoT in homes, enterprises, industries, governments, and other places is making wireless networks the backbone of the country\u2019s critical infrastructure. Safeguarding it against potential threats is a basic national security need.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">With 5G set to usher in industry 4.0\u2014the next industrial revolution, governments across the globe are understandably taking a keen interest in how 5G is deployed in their countries. There has naturally been a lot of emphasis on its security aspects. The current focus has primarily been on the network infrastructure side. Many countries, such as the USA, Australia, and New Zealand, have put restrictions on buying equipment from certain network infrastructure vendors such as Huawei and ZTE. As stated by these governments, their concerns are regarding the lack of clarity about the ownership and control of these vendors. While these concerns are valid, focusing only on the infrastructure side is not sufficient. It might even be more dangerous because it might give a false sense of security.<\/span><\/h6>\n<h6><span style=\"color: #000000;\"><b>Infrastructure-focused security is insufficient<\/b><\/span><\/h6>\n<h6><span style=\"color: #808080;\">Network infrastructure is only one part of the story. Telecommunications is often referred to as \u201ctwo-to-tango\u201d as it needs both infrastructure as well as devices to make the magic happen. So, to have foolproof security, one needs to cover both ends of the wireless link, especially for IoT. Securing only the network side would be akin to fortifying the front door while keeping the back door ajar. Let me illustrate this with a real-life scenario. Consider something as benign as traffic lights, which at the very outset, don\u2019t seem to need strong security. But what if somebody hacked into and turned off all the traffic lights in a major metropolitan area? That would surely bring the city to a screeching halt, resulting in a major disruption, and even loss of life. The impact could be even worse if power meters are hacked, causing severe disruption. It would be an outright catastrophe if critical systems, such as the national power grid, are attacked, bringing the whole country to its knees.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">When it comes to IoT devices, conventional wisdom is to secure only the most expensive and sophisticated pieces of equipment. However, often, simple devices such as utility meters are more vulnerable to attacks because they lack strong hardware and software capabilities to employ powerful security mechanisms. And they can cause huge disruptions. \u00a0<\/span><\/h6>\n<h6><span style=\"color: #000000;\"><b>IoT device security is a must<\/b><\/span><\/h6>\n<h6><span style=\"color: #808080;\">IoT devices are the weakest link in providing comprehensive system-wide security. \u00a0More so because IoT\u2019s supply chain and security considerations are far too different and much more nuanced than those of smartphones. Typically, the development and commercialization of smartphones are always under the purview of a handful of large reputed organizations such as device OEMs, OS providers, and chipset providers. Whereas the IoT device ecosystem is highly fragmented with a large number of relatively unknown players. Usually, large players such as Qualcomm, and Intel provide cellular IoT chipsets. A different set of companies use those chipsets to make integrated IoT modules. Finally, the third set of companies use those modules to create IoT end-user devices. Each of these players adds their own hardware and software components into the device during different stages of development. Because of this, IoT devices are far more vulnerable than smartphones.<\/span><\/h6>\n<h6><span style=\"color: #000000;\"><b>Address IoT device security during the procurement<\/b><\/span><\/h6>\n<h6><span style=\"color: #808080;\">It is evident that IoT users have to be extremely vigilant regarding security and integrity of the entire supply chain. This includes close scrutiny of the origin of the modules and the devices, as well as a detailed evaluation of the reputation, business processes\/practices, long-term viability and reliability of the module and device vendors. Because of the high stakes involved, there is also a possibility of malicious third-parties infiltrating the supply chain and compromising the devices even without the knowledge of vendors. Case in point, the much-publicized\u00a0<span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/bloom.bg\/2XsWnVW\" target=\"_blank\" rel=\"noopener\">Bloomberg Business Week report<\/a><\/span>\u00a0about allegedly tampered motherboards vividly exposed the possibility of such vulnerability. Although the allegations, in that case, are not yet fully corroborated or debunked, \u00a0it confirms beyond doubt that such vulnerabilities do exist.<\/span><\/h6>\n<h6><span style=\"color: #808080;\">It is abundantly clear that the more precautions IoT users take during the procurement and deployment phases, the better it is. Because of the sheer volume, and the long life of IoT devices, it is virtually impossible to quickly rectify or replace them after the security vulnerabilities or infiltrations are identified.<\/span><\/h6>\n<h6><span style=\"color: #000000;\"><b>The time to secure IoT devices is now!<\/b><\/span><\/h6>\n<h6><span style=\"color: #808080;\">Looking beyond the current focus on 5G smartphones, 5G Massive IoT will be upon us in no time. Building upon the solid foundation of LTE IoT, Massive IoT, as the name suggests, will connect anything that can and needs to be connected. This will span homes, enterprises, industries, critical city, state, and national infrastructure, including transportation, smart grids, emergency services, and more. Further, with the introduction of Mission Critical Services, the reach of 5G is going to be even broad and deep. All this means the security challenges and stakes are going to get only bigger and more significant. \u00a0<\/span><\/h6>\n<h6><span style=\"color: #808080;\">So, it is imperative for the cellular industry, and all of its stakeholders to get out of the infrastructure-centric mentality and focus on comprehensive, end-to-end security. \u00a0Every IoT device needs to be secured, no matter how small, simple, or insignificant it seems, because the system is only as secure as its weakest link. The time to address device security is right now, while the networks are being built, and the number of devices is relatively small and manageable.<\/span><\/h6>\n<h6><em><span style=\"color: #808080;\">Meanwhile, If you want to read more articles like this and get an up-to-date analysis of the latest mobile and tech industry news, sign-up for our monthly newsletter at\u00a0<span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/bit.ly\/TA-Newsletter\" target=\"_blank\" rel=\"noopener\">TantraAnalyst.com\/Newsletter<\/a>,<\/span> or listen to our\u00a0<span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/www.tantraanalyst.com\/ta\/podcast\/\" target=\"_blank\" rel=\"noopener\">Tantra\u2019s Mantra podcast<\/a>.<\/span><\/span><\/em><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>As the awareness of the transformative nature of 5G is increasing, the industry is slowly waking up to the enormous challenge of securing not only the networks, but also all the things these networks connect and the vital data they carry. When it comes to the Internet of things (IoT), the challenges of security couldn\u2019t [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2009,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"mc4wp_mailchimp_campaign":[],"footnotes":""},"categories":[58],"tags":[],"class_list":["post-2010","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-ai-compute-iot","post_format-post-format-image"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/posts\/2010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/comments?post=2010"}],"version-history":[{"count":0,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/posts\/2010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/media\/2009"}],"wp:attachment":[{"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/media?parent=2010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/categories?post=2010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tantraanalyst.com\/ta\/wp-json\/wp\/v2\/tags?post=2010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}