Telecoms, Datacoms, Wireless, IoT


The vulnerabilities and opportunities of IoT security

26 May 2021 Telecoms, Datacoms, Wireless, IoT

Today, there are 8,6 billion IoT connections. By 2026, that number will nearly triple to 23,6 billion, according to ABI Research market data.This exponential growth will usher in a new era of connectivity and productivity in the years ahead. However, it will also result in new threat vectors and vulnerabilities.

In fact, concerns about security in the Internet of Things (IoT) are widespread:

• Some devices are incapable of being secured, as a result of limited resources, processing capabilities and computing power.

• Original equipment manufacturers (OEMs) and vendors often choose to accept the risk, rather than remediate it during a cost-benefit analysis (CBA), while many others choose not to do a CBA at all.

• Functional safety-type IoT devices prioritise availability and often cannot simultaneously ensure confidentiality.

• There are limited IoT security solutions in the market, due in large part to the fragmented nature of the IoT itself.

While these security gaps pose a significant challenge for companies and end users, they also represent a tremendous opportunity for players in the IoT space, including IoT service providers, vendors, platform operators and information technology (IT)/operational technology (OT) security organisations.

Breaking down the $16,8 billion IoT security market

Much like the number of IoT connections is set to explode, so too is the revenue opportunity in IoT security. ABI Research market data shows that total revenue in the space will reach $16,8 billion by 2026.

The three market clusters

ABI Research classifies all IoT markets into three distinct market clusters based on low, moderate and high security requirements (see Figure 1).

Low security requirements: Agriculture, asset tracking, digital signage, home appliances, home monitoring, home security and automation, inventory management, kiosks, people and pet tracking, smart parking, smart street lighting, wellbeing, wearables and vending.

Moderate security requirements: Aftermarket telematics, commercial building automation, condition-based monitoring, fleet management, gas meters, heavy transportation, smart grid, video surveillance, smart meters and water meters.

High security requirements: Automated teller machines (ATMs), healthcare equipment monitoring, intelligent transportation, patient monitoring, OEM telematics and usage-based insurance.

The sheer number of new IoT connections over the next five years, the increased digitalisation capabilities of certain IoT markets (e.g. utilities, industrial, infrastructure and smart cities) and the increase in connected users and assets, along with the increased connectivity needs brought forth by the COVID-19 pandemic, are all fair predictors for digital security overall.

The amount of IoT security revenue, however, does not always correlate with the amount of IoT connections and some markets are expected to experience disproportional revenue. This is due to the multi-faceted level of security and management requirements that provide the foundation for other key operations and valuable services, including for intelligence operations and analytics, life cycle management and predictive maintenance, firmware updates and device and data integrity.

The high-security market cluster, which includes increased security profile devices like ATMs, points-of-sale (PoS), healthcare devices and OEM telematics, is expected to dominate, generating the majority of IoT security revenue and increasing from $2,4 billion in 2020 to $10,8 billion in 2026.

ABI Research forecasts that digital security services will enter the return on investment (ROI) equation significantly faster in the next three years, as both security vendors and IoT players will better understand how to protect the key monetisation applications related to their IoT strategies.

Four IoT security segments

ABI Research classifies IoT security services into four main categories: device security, network and communication security, data security and application security. Each category contains various technology components and holds different infrastructure requirements, which, in turn, differ greatly in each IoT market, vertical, or application. See Figure 2.

What is driving revenue?

Network and communication revenue driven by cloud and wireless services

Overall, IoT security services are expected to experience more than a 400% increase within the next five years, climbing from $3,8 billion in 2020 to $16,8 billion in 2026, marking a 28,1% compound annual growth rate (CAGR). Network security is expected to absorb the majority of the revenue, driven primarily by cloud security, wireless security and secure monitoring services.

Device security revenue will be primarily attributed to secure device provisioning and management, followed by encryption and hardware security services (secure root of trust (RoT), bootstrap, system-on-chip (SoC) secure firmware and embedded subscriber identity module (eSIM) management).

Increased attention to data protection endeavours by IoT vendors partly due to previous IT-borne regulations like the GDPR, NIST, ISO, and HIPAA

Organisations are also starting to place additional emphasis on data protection services due to increased concern for data loss prevention and data integrity endeavours. This is also partly driven by certain standardisations and regulations like the Health Insurance Portability and Accountability Act (HIPAA), the General Data Protection Regulation (GDPR), the National Institute of Standards and Technology (NIST) and the International Organisation for Standardisation (ISO) that managed to reach the greater IoT market landscape, especially with key user-focused IoT applications in the automotive market (i.e., aftermarket telematics, OEM telematics, intelligent infrastructure and heavy transportation).

Figure 1. IoT security connections and revenue by cluster (millions and $ millions).
Figure 1. IoT security connections and revenue by cluster (millions and $ millions).

Data security will be driven primarily by secure data hosting/storage, compliance and data management/governance. Security analytics and data privacy/anonymisation services will also see an increase in more user-focused IoT markets.

Firmware security, secure over-the-air (OTA), and patch management to drive application security

Finally, application security is expected to be driven mainly by secure firmware over-the-air (FOTA) updates for certain IoT markets (e.g. automotive and telematics), patch management for IoT devices and IoT routers/gateways and firmware security for certain types of attacks like web attacks, backdoors, zero-days, data exfiltration from web apps or insecure application programming interfaces (APIs), supply chain attacks, rootkits, botnets and cryptojacking, among others.

IoT device vendors are also keen to develop more security-focused software development kits (SDKs); however, DevSecOps endeavours still have a tough roadmap ahead to transition from IT-borne environments to larger threat surfaces and complex IoT environments.

Device versus cloud versus on-premises

The IoT security supply chain originates at the device level during manufacturing, then permeates all provisioning, management and monetisation services up until and including proper device decommissioning, thus ending its life cycle, while keeping the IoT fleet intact from any obsolete, insecure nodes.

Cloud, network and communication security will absorb the brunt of the business-as-usual IoT deployment and management,and setting the operational framework, protocols,and parameters required to manage devices, users and systems. Data and application security relate to more technical, albeit still crucial, characteristics.

This roadmap, however, is greatly affected by infrastructure, cloud and network architecture.On-premises and internally managed deployments versus private or public cloud architecture (software-as-a-service (SaaS), platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS), as well as managed security services (MSS) all have different service options and challenges associated with them.

Therefore, there are multiple ways in which IoT security services can be further sliced and categorised based on their point of application to device-centric and edge gateway services, on-premises services and cloud-based services with MSS options usually following the latter model.

End devices and gateways

IoT security services include identity issuance, provisioning, hardware security and attestation services involving digital certificates, encryption keys, X.509s, or any other form of ID.

On top of standard communication, routing and Internet protocol (IP) connectivity functions, IoT gateways and routers take on the device management mantle. Acting as a high-security node, IoT gateways are bridging management services between the edge and organisational servers either on-premises or cloud-based (public, private, or hybrid cloud). This crucial link is further strengthened (or weakened) depending on the overall infrastructure security posture.

Cloud-based services

The cloud is the dominant option for managing and securing IoT assets. The cloud offers flexible and scaling options for data storage, management of connected assets and securing said assets, along with providing adaptable services for users, devices, applications and systems. There is little doubt that public cloud-based security management options will expand their already superior services compared to on-premises services when it comes to the evolution of the entire IoT ecosystem.

On-premises services

On-premises security services involve having the organisations themselves handle the majority of system management and security internally. On-premises security services are not a fit for every organisation’s profile and there are several pros and cons to consider.

On the plus side, on-premises security services allow organisations to have additional control over their infrastructure, with limited public cloud assistance but potentially a higher dependence on the private cloud. However, on-premises deployments only work for specific IoT market verticals related to OT environments in critical infrastructure, energy, industrial and healthcare.

Strategic recommendations for companies and end users

ABI Research recommends implementing security services as a means to strengthen the IoT device identity and connectivity value chain, ensure ROI over existing IoT investments, prepare the infrastructure for scaling needs and understand which types of services (cloud, on-premises, server, gateway, or device) are aimed at three different options. These are:

• Core operations that must be protected at all costs.

• Value-added services for revenue generation.

• Useful, albeit secondary functions that can be revisited or reduced if needed.

The first option is mandatory for protecting all vital system functions. The second one will secure a stable ROI over time. The third one can be applied at a custom level, or decreased if the organisation is attempting a more cost-effective option and the associated threat vectors do not affect key operations. Many security vendors offer consulting services related precisely to understanding these unique needs for each organisation based on their infrastructure, strategy and IoT deployment needs.

Organisations still looking for a more cost-effective solution and still wishing to boost and secure their core operations versus the secondary ones, but that still struggle to implement security options, are advised to hone their ROI analysis skills in order to separate IoT management from IoT security. Ideally, security should obviously be part of the management equation of any IoT fleet, so for these companies, it is important to see the difference between the two.

Management versus security

Are management and security one and the same, or distinct responsibilities and functions? It depends on who you ask. Based on multiple interviews, it is clear that some vendors count it as being an integral part of regular operations, while others classify it as an additional endeavour.

From an organisational standpoint, there are two reasons to separate management services from security services. First, ROI can be properly attributed to all respective components, allowing IT to clearly separate security options from all the standard operations, including those offered by prospective partners. However, this can be quite challenging depending on the organisational needs (e.g. cloud, on-premises and hybrid options).

By knowing which communications, devices and servers are properly managed and secured, organisations can place additional focus on their most vulnerable entry points (e.g. remote industrial communications), reduce the threat surface in their more IP-heavy interactions (i.e., the more cloud-driven, Internet-heavy aspects), have a more precise understanding of what security tools are expected to do and determine what security vendors offer and what cloud providers cannot offer.

Strategic recommendations for vendors and providers

Device security services providers

Digital certificates, public key infrastructure (PKI), and internal certificate management services: The primary security service comes in the form of managing device identity through digital certificates. This can be achieved both through PKI or internally-managed certificates. Digital certificates are primarily related to asymmetric-based encrypted communication between two or more entities by using PKI, transport layer security (TLS)/secure sockets layer (SSL) and other cryptographic methods. The legitimate third party is called a certificate authority (CA), which offers another set of security services, providing a secure and confidential audit trail with an inherent level of non-repudiation that can be extended across most cloud services.

Other than involving the role of a CA, certificate issuance can also be performed internally in an organisation. Also referred to as ‘private’ issuance, this involves an organisation issuing its own digital certificates to accompany the encryption process of its devices, software, websites and users. CAs and other security vendors can also provide assistance in this process by helping organisations issue their own certificates without actually being involved in the overarching process.

Implementers should expect that there are certain issues concerning the application of digital certificates in the IoT and additional infrastructure challenges for private/internal ways to identity issuance and management using hardware security modules (HSMs), the use of secure hardware in edge devices and many other factors related to the transition from enterprise to a larger IoT business strategy.

PaaS/IaaS-based security services: According to multiple interviews, there is a serious problem with third-party manufacturing facilities in certain countries and primarily in Asia-Pacific, where manufacturing players steal intellectual property and company secrets from their partners. For many, there is an expectation that the hardware design, software, apps, or any related programming or design architecture will, in some way or another, be copied by their own manufacturing partners.

Secure manufacturing services can be offered as PaaS or IaaS using virtualised hardware in industrial and OT environments. Industrial players can also benefit from virtual data centres using IaaS, allowing them some flexibility over the constant needs of scaling infrastructure going the ‘pay-as-you-go’ way, especially because many Industrial IoT (IIoT) players are deeply concerned (or should be) regarding their legacy, long-life industrial equipment. The IaaS approach can provide this on-demand flexibility through virtualised hardware, which, in turn, can also be retrofitted with additional secure manufacturing and firmware installation security services.

Network and communications security services providers

The future of IoT security rests on autonomous remediation and intelligent cloud and network security: Research interviews and market insights gathered from security organisations like the European Union’s (EU) Agency for Cybersecurity (ENISA) and the IoT Security Foundation, as well as leading firms like Intel, Microsoft, Thales and Qualcomm, ascertain that the multiplicity and sophistication of cyber threats are steadily forcing a chokehold on IoT implementations, unless IoT security is tackled uniformly across the entire value chain, instead of simply focusing on a specific component.

This grim assessment is supported by multiple security-focused vendors like Cisco, Symantec, Entrust, Palo Alto and McAfee, as well as IoT gateway vendors like Cradlepoint, Eurotech, and Kerlink. The advent of 5G cellular connectivity will also greatly increase the IoT threat surface and distributed-denial-of-service (DDoS) attacks are expected to become even more powerful over time.

While different organisations are obviously set to support the section of the value chain they operate in (i.e., hardware, software, or platform), the truth of the matter is that cloud, network and communication security is becoming more important than ever, even with the recent move toward edge processing and edge security services.

Figure 2. Total global IoT security markets segmented by security technologies.
Figure 2. Total global IoT security markets segmented by security technologies.

Successfully migrating IT security to OT environments, increasing device visibility, securing OTA updates and management operations, investing in cloud-based security options, adjusting encryption processes to favour asset monitoring, network traffic monitoring and persistent threat hunting should be among the top priorities for IoT players.

While MSS are a lot easier to implement in IT-focused environments, they are also quite hard to migrate to most IoT markets due to their specific application needs and complexity. However, cyber threats continue to mount and have even been exacerbated by the COVID-19 pandemic. Additionally, most IoT markets lack the knowledge, resources and sometimes even the capital to invest in security services, which is also partly due to organisational misalignment.

Therefore, some form of intelligent and autonomous network security, threat monitoring and remediation, at even the most basic level, should be part of the IT security budget for any new IoT application. This endeavour does not have to span multi-cloud platforms or high-budget security operation centres (SOCs) to monitor each and every entry point or connected asset. Rather, equipping specific high-value organisational applications with some form of intelligent and autonomous (or semi-autonomous) cloud or network protection will greatly assist IT operations.

Data security services providers

Simply ascertaining data encryption by itself might be a meaningless statistic

Encrypting data only partly equates to overall data security. Verifying the integrity of the device, user, or platform, along with the data stream, applying identity and access management, and restricting privileges for all server and cloud administrators, along with system availability, should all be considered equally. Similarly, firewall security is a necessary, albeit intelligence-dependent component, requiring that different analytics and intelligence operations be custom-fitted for each specific IoT market, rather than a one-way contingency consideration.

This is based on three key findings from interviews conducted across multiple research projects with cloud providers, digital identity providers and connectivity and security vendors:

Data encryption capabilities are vastly misunderstood for the entire IoT ecosystem, with some companies positing that only 15% of IoT communications are encrypted, while others believe that amount is significantly lower and below 5%. On the other hand, IoT players (especially in industrial and smart cities applications) believe that data encryption will not only severely affect operational latency, but data security, in general, will not justify the added cost

Data loss prevention (DLP) tools and firewalls do not always protect all fraudulent traffic or provide 100% protection for related DLP practices. Vendors offered different estimates ranging from 15% to 35% of cyberattacks bypassing firewalls. This percentage is expected to increase significantly for certain IoT markets with less-than-optimal digital security capabilities (e.g. building automation).

The risk of advanced persistent threats (APTs) has increased considerably over the last three years. Security vendor interviewees estimated that in IT environments, APTs can lie undetected, siphoning data from compromised systems in stealth for a period ranging from three to six-and-a-half months in most cases.This percentage is at least 50% higher than just two years ago based on similar research conducted by ABI Research. When applied to the larger IoT ecosystem, this range can increase considerably by an additional two-and-a-half months and varies greatly depending on geographical location and the IoT vertical in question, which, in turn, affects other key factors like legacy equipment and security infrastructure, IP and communication protocols dependencies, threat surface and perimeter defence.

Application security services providers

On-premises cost efficiency versus product support and managed services

Application security is highly dependent on the choice of product support, or at least the breadth of resources available to in-house talent. Choosing to work using open-source operating systems (OS), integrated development environments (IDEs), or any IoT framework is a popular cost-cutting measure for application development. However, always keep in mind that immediate partners and service providers are also aligned with this vision and that customers are well informed about any potential challenges or shortcomings.

This is a fine line to walk, because companies are not expected to bluntly mention to their clients that their choice of a free real-time operating system (RTOS), Linux OS environment, or SDK is lacking security playbook options, or a Raspberry Pi hardware-based IoT gateway will require additional in-house talent, resources and manpower to support over time. In many cases, this might force in-house developers to scour different free frameworks, GitHub databases and open resource libraries in order to find a solution for various service-breaking problems that might arise from said free resources.

This is not to say that free IoT resources do not have their place in the development of the IoT ecosystem. Rather, this suggests that certain companies might feel more secure using a proprietary platform with stable time-tested applications, rather than embark on an implementation journey where certain security service hurdles are to be expected.

Do not underestimate the value of APIs

APIs are the unsung heroes of IoT implementations. Poorly designed APIs can severely hinder cross-vertical implementations, not to mention overburden IT departments when it comes to device authentication, software-based authentication and security alert streamlining.

For example, good API design can make the difference between effective web-based identity provisioning for beacons, password (PW) devices and a chaotic mash-up of device IDs struggling to find their way to the cloud. Always keep in mind that IT should have a clear picture of which resources APIs have access to, especially when third-party entities are involved.

Dive deeper into IoT and digital security

To learn more about ABI Research’s digital security, or M2M, IoT and IoE research services, visit www.abiresearch.com/market-research/service/digital-security/ or www.abiresearch.com/market-research/service/m2m-iot-ioe/ respectively (or get redirected via the short URLs www.dataweek.co.za/*may21-abi1 and www.dataweek.co.za/*may21-abi2).





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Module combines 5G and NTN support
Quectel Wireless Solutions Telecoms, Datacoms, Wireless, IoT
Quectel Wireless Solutions announced the launch of its BG770A-SN ultra-compact 5G-ready satellite communication module, compliant with 3GPP releases 13, 14 and 17.

Read more...
Scalable and secure IoT device onboarding and management
Telecoms, Datacoms, Wireless, IoT
EasyPass is an enhancement within Cambium’s cnMaestro platform, aimed at providing local businesses with secure, efficient, and scalable device management, making it ideal for high-demand environments such as educational institutions, retail spaces, and corporate campuses.

Read more...
SIMCom’s A7673X series
Otto Wireless Solutions Telecoms, Datacoms, Wireless, IoT
SIMCom’s A7673X series is a Cat 1 bis module that supports LTE-FDD, with a maximum downlink rate of 10 Mbps and an uplink rate of 5 Mbps.

Read more...
Non-terrestrial network module
Altron Arrow Telecoms, Datacoms, Wireless, IoT
Fibocom unveiled its MA510-GL (NTN), a non-terrestrial networks module which is compliant with 3GPP Release 17 standard.

Read more...
Cellular IoT connectivity via satellite
Altron Arrow Telecoms, Datacoms, Wireless, IoT
The Telit Cinterion cellular LPWA module will enable satellite data communication using the NB-IoT protocol, without any special hardware changes required for the integration of the cellular module in the customer application.

Read more...
Wireless module supports up to 600 Mbps
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Quectel’s FCU865R is a high-performance Wi-Fi 6 and Bluetooth 5.3 LCC package module which can be used for WLAN and Bluetooth connections.

Read more...
Unlocking the future of connectivity
Telecoms, Datacoms, Wireless, IoT
The battle for the 6 GHz spectrum band is heating up in South Africa, mirroring global debates on the allocation of spectrum between Wi-Fi and cellular operators.

Read more...
Quectel wireless module wins accolade
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
The winners of the 2024 IoT Evolution 5G Leadership Award were recently announced, with Quectel walking away with an award for its modules which make 5G features more easily accessible for IoT applications, notably the company’s RG255C-GL.

Read more...
Innovative upgrade process for 2G/3G
Otto Wireless Solutions Telecoms, Datacoms, Wireless, IoT
What is likely to happen during the sunset period for 2G and 3G signals, especially on the back of already near-obsolescence of 2G network equipment, is for the availability of the connectivity mediums to begin to reduce between now and the shutdown date.

Read more...
RFID in aviation: the ultimate solution to baggage mishandling
Osiris Technical Systems Editor's Choice Telecoms, Datacoms, Wireless, IoT
Creating a solution that enables real-time tracking of airline baggage on a global scale seems like an impossible task when considering the number of airlines, airports, and passengers that flow through and between them.

Read more...