Remote - M2M Special Issue 2013 - (Page 4)

Feature Article Towards Right-Sizing Security for M2M Solutions: A Practical Approach Jon Howes, Beecham Research Security for M2M solutions is a current focus for Beecham Research, with a report that identifies a new balance and new opportunities emerging in the market. This paper discusses the issues and approaches to security in M2M that are making a real difference. over, connected objects communicate at a far faster rate than humans, and any adverse effects can arise independently, resulting in damage before it can be mitigated. M2M Solution Security a High Priority Many past and current M2M solution developments have provided both connectivity and security through the use of the secure capabilities of the SIM cards within embedded cellular modules, and at the other end of the M2M solution through the security in the cellular wireless network. In fact, the module plus the SIM has been rightly seen to provide sufficient security for the demands of those systems and their perceived threats. An M2M solution chain is complex with multiple suppliers, technologies and communications, and will likely grow in complexity. As M2M solutions have become more widespread and more critical, more areas are identified where security needs to be added. For example, some connected devices’ embedded systems developers have identified a need for encryption and decryption of varying strengths from sensors; here, the first approach, which can be sufficient for many M2M solutions, is to integrate off the shelf chips that provide encryption and decryption. As pressures on the level of required security increase, many have recognised that the protection of secured communication subsystems does not extend to all parts of the remainder of the supply chain. M2M solutions are increasingly incorporating Elements of Security at different points in the supply chain. These may involve hardware, operating systems, embedded security and the application layer and other parts, and are being independently developed by several different supply chain players for a variety of needs. A recent survey conducted by Beecham Research of leading M2M solution providers in North America, Europe and AsiaPac found that ensuring end to end security was their highest priority for current M2M projects. This is indicative of the growing requirement. Figure 1. Beecham Research Survey of leading M2M providers Reports of data loss and corruption, access intrusion and distributed denials of service are growing at an alarming rate. For example for Industrial Control Systems, in 2011, the year after the discovery of Stuxnet, more than five times as many vulnerabilities were reported compared to the previous five years. These discoveries of new vulnerabilities doubled again in 2012. These and other documented examples of security breaches illustrate the potential for harm. For this reason, security solutions for all manner of IT projects including those in M2M are gaining in importance. M2M systems comprise a complex chain of connected systems and devices; hence the M2M community is right to be concerned about their increasing targeting by attackers, particularly via the Internet. For this reason, end to end M2M security has shot up the priority list. Whilst there has been an aversion in the market to discuss security issues openly, and the threat of hacking M2M-based operations is relatively low at present, this state of affairs is unlikely to continue. A major attack could have a significant impact on M2M market development and public trust. However, the meaning of a system’s security and requirements are not fully understood. Despite much talk about ‘end to end’ security, the ‘ends’ are not always clearly defined. Security is too broad and eclectic a concept to define, and its definition and implementation depend on its value to the solution. As security solutions are defined by the perceived threat or threats of the system in question, the meaning and requirements for security are different in different M2M vertical market segments. In business critical applications/operations, data security and the physical integrity of remote devices tend to be paramount. Hence any failure that prevents delivery of the service is a threat. By contrast, in consumer applications such as telehealth and smart metering for example, the security of personal information is already becoming an issue of greater concern. New risks arise when devices are inextricably linked in an M2M delivery chain; for example, a persistent identifier could link the data back to the device from which it was collected or back to an individual. More 4 www.RemoteMagazine.com Evolving ‘Elements of Security’ Killing the M2M Patient? Assuring end to end M2M security will likely involve more than one specialist vendor in these Elements of Security. The challenge is for the multiple elements provided by these vendors to be dynamically linked together to form an end to end chain, in order to mitigate a specific threat. Identifying the nature of that threat will be key, and will necessitate input from sector specific experts. We should not forget the role of the customer and end user; suppliers of technology may provide design expertise, but customers and ultimately end users must understand their business and the business implications of these design choices. Figure 2. Diagrammatic Representation of the M2M solution supply chain, with participants and suppliers, including those providing ‘Elements of Security’ http://www.RemoteMagazine.com

Table of Contents for the Digital Edition of Remote - M2M Special Issue 2013

Towards Right-Sizing Security for M2M Solutions: A Practical Approach
Intelligent Power Distribution for M2M Communications
Optimizing Remote Monitoring in the Cloud
Exponential M2M Market Growth Calls for Innovative RF and Antenna Solutions
Benefits of Using Wireless Networks to Automate FAA-Mandated Obstruction Light Monitoring Requirements
Energy Management Systems For Green Buildings
M2M Products and Services
Industry News

Remote - M2M Special Issue 2013

https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com