Addressing the IoT Security Challenge

Chani Agarwal, Pre-Sales Engineer for Rahi Systems, discusses the security challenges facing IoT, and how businesses can safeguard themselves against the possible threat of a cyberattack


The Internet of Things is already transforming entire industries and bringing an array of benefits to organisations of all sizes. However, the devices that comprise the IoT have notoriously weak security, creating a massive attack surface to be exploited by malicious actors. Security has typically been an afterthought, but organisations need to put procedures and controls in place to reduce the risk of a cyberattack.

An IoT device can be anything with a unique ID that is attached to the network, and the number of IoT devices has been growing on a very large scale. One research estimates that by 2025 there will be about 75 billion devices connected to the Internet.

The sheer size of the IoT makes security a big challenge. The traditional IT environment, including computers, networking devices and the like, typically includes hundreds, maybe thousands of devices. Enterprise initiatives can increase quickly in scale to include hundreds of thousands of devices. These devices generate huge volumes of data that is distributed across the environment from the edge to the cloud.


How secure are IoT devices?

Internet of Things devices are also much more diverse than traditional IT devices, and there are very few standards in place for managing and securing them. Security controls typically aren’t implemented on the Internet of Things devices themselves because of limited battery life. Also, IoT devices don’t have a lot of computing power, so they can’t provide encryption and other security services.

In light of these challenges, organisations should adopt a layered approach to IoT security. As an initial step, organisations need to safeguard IoT devices from external attack. This requires a firewall with IoT-specific protocols and Layer 7 application signatures. Additionally, network segmentation should be used to prevent the lateral proliferation of threats.

IoT devices should be monitored for anomalous behaviour. Organisations should collect and analyse log files using a security information and event management (SIEM) solution.

Advanced threat prevention (ATP) is also essential. Because IoT devices lack security controls, hackers are able to find vulnerabilities and attack the devices with unknown malware, so-called zero-day attacks. The 2016 distributed denial of service (DDoS) attack on DNS provider Dyn is probably the most famous example. The attack leveraged a huge botnet of IP video cameras, residential routers and other consumer IoT devices that had been infected with the Mirai malware. The attack took down major websites, including Amazon, Netflix, Twitter and the New York Times.


READ MORE: Why Today’s Global Businesses Need a Cloud-Delivered Firewall Solution



There are many other forms of advanced malware that exploit Internet of Things devices to form botnets, and signature-based malware detection is ineffective against these threats. The Juniper Sky Advanced Threat Protection solution combines cloud-based threat detection with the SRX NGFW to identify and block zero-day attacks. It also employs a sandbox where malware is detonated in a contained environment and patented machine learning capabilities that analyze and adapt to the malware.

Many enterprises that implement Internet of Things applications try to move security features toward the network edge. A better approach is to have end-to-end, pervasive security, after all the network is only as strong as its weakest link. If someone can hack into an IoT device (as innocent as your “smart” coffee machine or Smart TV), odds are high that they can hack into the entire network. In addition, the data generated by the IoT is going to be omnipresent, so security will need to be everywhere.

Most important, IoT security should not be an afterthought. If you’re planning an Internet of Things initiative, it’s crucial you look for assistance in developing a security strategy and implementing the right processes and tools.


Rahi Systems delivers a suite of solutions and services that optimises the cost, performance, scalability, manageability and efficiency of today’s integrated environment.

Chani Agarwal

Chani Agarwal is a network presales engineer for Rahi Systems. Chani has also worked as a business process analyst focused on audit and risk management for IT.

The Future of Smart Buildings: Trends in Occupancy Monitoring

Khai Zin Thein • 12th June 2024

Occupancy monitoring technology is revolutionising building management with advancements in AI and IoT. AI algorithms analyse data from IoT sensors, enabling automated adjustments in lighting, HVAC, and security systems based on occupancy levels. Modern systems leverage big data and AI to optimise space usage and resource management, reducing energy consumption and promoting sustainability. Enhanced encryption...

The need to weave agility throughout the business

John Craig Swartz SVP at POWWR • 11th June 2024

With geopolitical tensions, more extreme weather events and the legacy of a global pandemic, it is more difficult for energy suppliers to preserve their margins and remain competitive than ever before. To thrive in the current climate, it is imperative that a supplier makes marginal gains wherever they can. Profitability within the sector today hinges...

Artificial general intelligence is closer than expected

AI expert Stuart Fenton • 10th June 2024

Whilst most of the attention around artificial intelligence (AI) thus far has been on ChatGPT, it is just the tip of the iceberg. In many ways, ChatGPT shouldn’t be thought of as true AI as it is – at its heart – just generative, learned behaviour. The future of AI, in contrast, is a system...

The State of Data Streaming

Confluent • 06th June 2024

Confluent survey: 90% of respondents say data streaming platforms can lead to more product and service innovation in AI and ML development 86% of respondents cite data streaming as a strategic or important priority for IT investments in 2024 For 91% of respondents, data streaming platforms are critical or important for achieving data-related goals

The State of Data Streaming

Confluent • 06th June 2024

Confluent survey: 90% of respondents say data streaming platforms can lead to more product and service innovation in AI and ML development 86% of respondents cite data streaming as a strategic or important priority for IT investments in 2024 For 91% of respondents, data streaming platforms are critical or important for achieving data-related goals

Grant Funding Awarded to Advance Cancer Therapeutics Discovery

Dr Alan Roth • 04th June 2024

The CRUK (Cancer Research UK) Scotland Institute and Oxford Drug Design, a biotechnology company with core expertise in AI drug discovery, have announced that their joint application for the MRC (UK Medical Research Council) National Mouse Genetics Network (NMGN) Business Engagement Fund has been awarded.

Grant Funding Awarded to Advance Cancer Therapeutics Discovery

Dr Alan Roth • 04th June 2024

The CRUK (Cancer Research UK) Scotland Institute and Oxford Drug Design, a biotechnology company with core expertise in AI drug discovery, have announced that their joint application for the MRC (UK Medical Research Council) National Mouse Genetics Network (NMGN) Business Engagement Fund has been awarded.