Internet of Things Cybersecurity

The biggest concern about the Industrial Internet of Things is security. Classifying the devices that comprise such applications can be a big step toward addressing the IIoT cybersecurity issue in easy-to-manage segments.

AW 95591 ICONLABS1

在每个行业会议或活动中有关物联网(IoT)的每次讨论中,安全问题总是会出现。这是一个充分的理由。要接受IoT概念,并将自己定位为其所有潜在的改变游戏规则的好处的接收端,您必须将许多植物层设备连接到互联网。在此过程中,您有可能将操作暴露于存在的每个黑客。

Viewed from this perspective, the cybersecurity challenges of the IoT seem overwhelming. And the ongoing rush of new security products and approaches—from embedded devices to in-depth IT policies and procedures—makes it even harder for many manufacturers to determine what to do first.

Alan Grau, president and co-founder of图标实验室,对问题提供了不同的看法,以帮助工业公司解决问题。他说:“挑战的一部分是认识到每个物联网设备都需要采取不同的安全方法。”“那么,如何确定设备的正确安全级别?”

Grau建议首先认识到具有常见安全问题的四个设备类。他将这些班级描述为:

  • Class 1—includes very small ZigBee, Bluetooth, and near-field communication (NFC) IoT devices often using 8 and 16 bit MCUs. Industrial examples of these devices include remote telemetry (often battery-powered), sensors, and other lower bandwidth sensors and devices.
  • Class 2—these devices are typically small, low cost RTOS-based devices utilizing 32 bit MCU systems, such as medical devices, low-end network appliances, and telematics often paired with cellular or Wi-Fi connectivity.
  • Class 3—this class of devices is exemplified by larger and more expensive medical and industrial automation devices, such as robotics and even smart automobiles, which are usually powered by 32 bit MPUs with Ethernet or Wi-Fi connectivity.
  • 第4类 - 在此处,设备运行单个或多个32或64位处理器,并使用嵌入式Linux,Android或支持多个网络协议的功能齐全的RTO。门户,高端医疗设备和军事设备就是常见的例子。

通过以这种方式对网络上的设备进行分类,可以在更容易平易近的细分市场中解决您的物联网网络安全问题,而不是尝试一次确保所有内容。

“很明显有重叠在这些(类),” Grau says, “but this model allows some general assessment of security requirements. Determining the details of security capabilities and features to be implemented for a given device depends upon the available memory, processing power of the core(s), interfaces, attack vectors, threat analysis, and ultimately, business trade-offs.”

The Floodgate Security Framework offered by Grau’s company, Icon Labs, is designed to address the differing cybersecurity needs for the varying class levels of devices. To learn more about this Framework of security products, visit:www.iconlabs.com/prod/product-family/floodgate-security-framework.

本文中的公司
在网络中更多