The Driving Force of the Internet of Things

IoT logo

Barely a day goes by without new developments regarding the Internet of Things (IoT) and, frankly, it’s exciting to imagine a world where we can control literally everything from a smartphone.

Yet there is a contrarian viewpoint that we may need to consider since it is all too easy to get swept along with today’s relentless advancements in connected devices. My major concern is where security sits within the grand scheme of IoT, particularly in the vehicle industry.

There are many uses for having full remote control over vehicles, and science fiction is becoming reality. Some of the applications include fleet management and control, location of stolen vehicles, pre-programming journey routes as well as emergency assistance in the case of accident. But since car manufacturers foresee vehicles becoming mobile ecommerce platforms (iPhone on wheels), we can soon expect location-based ads appearing on our car dashboards, such as where the nearest Starbucks is or where to buy fuel once the car realises that your tank is close to empty, perhaps with a voucher for a Whopper.

There are other concerns too, including the real possibility of distraction whilst driving. UX designers and safety campaigners are already getting worked up about how many accidents will result from the rapid deployment of these devices, however I am more worried about the first hack that sends you down a blind alley, or collects personal data about your driving habits.

There are several reasons why we need to take this seriously, mostly because connected cars are like an iPhone on wheels, and consequently susceptible to all of the same issues we face on a daily basis with computers. What’s more cars are big hunks of metal and when not in control, can do a lot of damage.

So where is this going to take us? More often than not, businesses are driven by profit and only invest in safety innovation when required to do so, either by governments, peer pressure or customer demand. We know this because safety studies in developing nations continue to show the dreadful outcome of not wearing seat belts or tolerating drinking and driving, so we should take this into consideration when thinking about how to avoid the consequences of insecure connected vehicles. And if we think even further ahead, what happens when driverless cars start to appear on our roads? Based on recent reports, serious trials are about to start on public roads. This also raises concerns about physical safety, since the systems, perhaps running in the cloud, controlling and coordinating the vehicles are all prone to intrusion and failure. If the US government can’t keep its personnel records secure, what hope is there for a car manufacturer?

Connected Cars are highly complex systems, not quite like but not dissimilar to aircraft. The vast majority of the components found in Connected Cars are designed and made by companies other than the car manufacturers. This represents an integration challenge, since history has shown us that highly integrated IT systems are prone to failure, which is something that cannot be tolerated in cars.

As is often the case, the other side of the challenge coin is a growing opportunity for the channel, from security services (designed, development, testing, compliance) to the development of secure code. We are at an early stage in the development of Connected Cars, with a long way to go, and entrepreneurs and innovators in the channel have a unique opportunity to create a niche in what is a high value market. As with mainstream IT, security professionals are in short supply, forcing companies to turn to trusted channel partners, and this will prove to be even more so in the Connected Car world.

Much of this is speculative, but what we do know is that the Internet of Things is here to stay and connected cars are becoming a common sight on our roads. We will see innovation occur much faster than ever thought possible as the ubiquity of fast networks collides with the availability of high-powered software. The hardware to support this already exists and is ready for use. I would subscribe to the view that the security industry has both obligations and huge opportunities in its midst. As usual it will not be the large companies that provide the innovation. It will be left to an entrepreneur with a world-saving vision.

Richard Kirk is SVP, telecom and service provider sales, AlienVault

Latest in Security
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
NHS logo displayed on a smartphone screen in white lettering on a blue background.
NHS supplier hit with £3m fine for security failings that led to attack
OpenAI logo and branding pictured at Mobile World Congress 2024 in Barcelona, Spain.
OpenAI announces five-fold increase in bug bounty reward
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Latest in Feature
A photo of UNSW's Sunswift 7 car pictured in front of Uluru in Australia's Northern Territory.
How UNSW’s Sunswift Racing and Ericsson achieved cross-country connectivity in Australia’s outback
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?