The Achilles heel of the Internet of Things: hackers

Many people agree with the importance of information security, but it is always the same thing. The same is true for Internet crime, and unless you have experienced it, you will not realize its seriousness. For the Internet of Things, which is still in its infancy, its fragile security is too young. In fact, the security issue is the Achilles heel of IoT technology, and it is also the key to whether the Internet of Things can survive and be successfully applied to the market. The Korea Industrial Research Institute believes that the economic loss caused by the information security problem of the Internet of Things in 2020 will reach 17.8 trillion won (about 18 billion US dollars). Today's hacking mainly occurs in the Internet (virtual space), which is manifested in the disclosure of online personal information or crimes in financial accounts; but in the era of the Internet of Things, its victimization area includes not only the virtual space of the network, but also the real life. This means that in addition to personal privacy leaks and economic losses, personal life safety and national infrastructure will also be threatened.

Known as "hacker-specific Google" and "Internet of Things", Shodan is a search engine that provides Internet online devices. Just enter your search keywords and you'll be able to find online webcams, routers, lights, nuclear power plants and other vulnerable devices. CNN said that the world's strongest and most horrible Internet search engine is not Google, but Shodan. The company's founder, John Math-erly, said that people usually think that Google can't find it and can't find it, but it's not true. Some companies even use Shodan to find network nodes with security holes and make public sales profitable. Vupen is one of the Internet security companies involved in these businesses. In early 2015, the company changed its name to Zerodium, and achieved new business growth points by purchasing various information vulnerabilities and sales on the Internet from hackers around the world. Recently, at a price of 1 million US dollars, publicly offered a reward for the acquisition of Apple iOS 9 security vulnerabilities, causing widespread public debate. Where these vulnerabilities will be used, I think everyone knows. All things connected to the Internet, including smart homes, smart cars, smart cities, etc., are even more insecure and fragile.

It is estimated that there will be 50 billion devices connected to the Internet in 2020, but the current networked devices are only 1% of the predicted value. Even so, there have been many security incidents caused by information breaches in various fields such as home, industry, transportation, broadcasting, and medical care. Here are a few representative cases: In November 2014, a company in Russia called Insecam published information on more than 73,000 surveillance cameras hacked by hackers on its website; Surveillance cameras in the living room and swimming pool are very popular.

Internet home appliances cannot be taken lightly. In January 2014, Proofpoint, a US security technology company, said, “Through TVs and refrigerators, more than 750,000 spam and fraudulent information has been sent to major companies and individuals around the world.” If the Internet of Things is cracked, you can remotely control the smart devices in your home, the so-called “Home Hacking”; hackers can control the smart gates of the porch as they please, unblock the surveillance camera, and even control the indoors at will. thermostat. Synack, a representative company in the field, once found and publicized the information vulnerabilities of Google's acquired surveillance camera company DropCam; after externally attacking the weak point of the password (heartbleed), it monitored the room through the camera and secretly opened the microphone on the camera; Even at the 2014 International Security Technology Conference (ISEC), the safety system for cleaning robots was cracked on-site, and the indoor environment was broadcast live to the conference site through the camera on the robot. It seems that in the future people will have to be wary of sharp eyes from surveillance cameras and cleaning robots.

Internet cars are no exception. Some time ago, there was a video on Youtube that two hackers cracked the Cherokee Jeep's security system and implemented remote control. Hackers say they just want to prove that cars, like computers, can be the target of cyber attacks. Because of this video, Fiat Chrysler immediately announced the recall of 1.4 million cars; Uber, a well-known taxi software company, even hired two top hackers, Charlie Miller and Chris Ballas, as the company's chief information security expert. These hackers also said that car owners who buy cars can't provide enough security for their cars, and they can only hope that manufacturers can produce safer cars for them. It seems that smart cars and unmanned cars can't ride safely.

What about the medical or health field? The International Hacker Security Forum has demonstrated on-site cracking of medical equipment and remote control of insulin pumping for diabetic patients and heartbeats for heart patients. The US Food and Drug Administration (FDA) has also recently banned the use of drug-injected pumps that have Internet capabilities but lack safety features. The reason is that if the Internet of Things is cracked by hackers, the patient's life will be in danger. According to the test results of the information security enterprise Symantec, the motion sensor of the smart bracelet can realize the positional positioning of the user, so the user is reminded to use all kinds of smart bracelets cautiously. It seems that medical and health smart devices have also become "hunting grounds" for hackers.

A general IoT product that integrates sensors and basic communication functions, its security vulnerabilities are even more worrying. On such low-cost equipment, it is almost impossible to use complex and power-hungry existing security systems. And there are too many kinds of network environments, operating systems, and operators. It is difficult to use a common security system; it is difficult to identify responsible parties when it is found. Security technology experts said that to achieve the security of the Internet of Things, it is necessary to introduce security solutions from sensors, devices, networks, platforms, services, etc., and finally integrate and implement a comprehensive solution. The South Korean government has launched the IoT Information Security Roadmap Program to strive for smarter countries that can use the Internet of Things with confidence. All of this requires a lot of money, but in order to ensure the success of the Internet of Things, these are the costs that must be paid.

In addition to physical security, the protection of personal information will become increasingly difficult. Even some of the customer's favorite data can be collected and sold as a product; including the customer's position, when to buy something, what food to like, and so on. In the Internet of Things era, all personal information will be stored in a module in the IoT device, and personal information is no longer personal. Just like the US government's prism program, the government also participated in the incident of invading IT enterprise servers. Google’s Eric Schmidt said, “If you don’t know people, leave the network.” As long as you are connected to the Internet, information disclosure will be inevitable. In the 2015 CES keynote speech, US Federal Trade Commission Chairman Eddie Ramirez highlighted that the Internet of Things may now be sweeping the IT industry, but there is still no system for consumers to trust. No matter what technology or service, even if it is advanced, if there is no guarantee of user safety and personal privacy, it will not be able to achieve market accommodation. This will be another problem facing the Internet of Things.

Brushless BLDC Worm Gear Motors

Worm Gear Motor,Planetary Gear Motor,Brushless Gear Motor,Brushless Bldc Worm Gear Motors

Jinan Keya Electron Science And Technology Co., Ltd. , https://www.keyaservo.com

Posted on