A one-size-fits-all approach won’t secure the IoT

1 August 2019 News & Events, Information Security

Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach, and every kind of connected object must be assessed individually, the co-chair of Trusted Computing Group’s (TCG) Embedded Systems Work Group said.

Speaking on the second day of Embedded Technologies Expo and Conference 2019, Steve Hanna highlighted how the growing trend for greater connectivity puts everyday objects at risk of exploitation and makes mission critical systems in businesses and governments more vulnerable to attacks.

And while securing the IoT is often referred to as a singular movement, Hanna emphasised that every device had to be handled according to its individual needs, warning that there would be no single method that could be universally applied to safeguard devices.

“When you consider other security systems, for example a lock, what you would use for a front door is very different to what would be used for a bank or a government building because the scale of an attack would be much greater and more complex in the case of the latter,” he said. “The same is true for computers and embedded systems; when we think about security, we have to think about different levels that correspond to the level of risk.”

Hanna illustrated his point by comparing a baby monitor with a chemical plant – both of which are likely to become connected as standard in the near-future. For the latter, he said, the impact of an attack could be as serious as an explosion which would ultimately endanger human life.

“While it is important to secure things like baby monitors, for example, to avoid the devices being used to eavesdrop on conversations, there is a price point that needs to be met as well – no one is going to spend thousands of dollars on a baby monitor and for the manufacturers, that means the security solution needs to be less expensive,” continued Hanna. “In the case of a chemical plant, the risk is much greater, the level of attack is likely to be more sophisticated and a serious amount of money could have been invested in carrying it out. As a result, the security measures need to be much more stringent.”

He went on to explain that the customised security approach required by the Internet of Things can be easily achieved using technologies that are available today. TCG’s security standards are all based on the concept of Trusted Computing where a Root of Trust forms the foundation of the device and meets the specific requirements of the device or deployment.

“TCG’s wide variety of security options provide the building blocks to create secure systems,” said Hanna. “In the case of a chemical plant, industrial-grade discrete TPM hardware can be built in not just into the plant’s firewall but also into the control system. This will enable these systems to be monitored in real-time and for even sophisticated attacks to be identified and prevented. For devices which are less high-risk, TPM firmware can be created which has the same set of commands but is less rigorously secured and therefore more cost-effective. Finally, for very tiny devices that can’t afford TPM firmware, DICE offers a good alternative.”

The organization offers a number of resources for developers and designers at develop.trustedcomputinggroup.org





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
From the Editor's desk: The good, the bad, and the victims
Technews Publishing News & Events
When the Internet first arrived, everyone was expecting amazing things from it, well, everyone who knew what it was and how it worked. We had the dotcom boom and bust, and it’s fair to say that if we ...

Read more...
Carrier rebranded Kidde Global Solutions
News & Events Fire & Safety
From July 2025, the former Carrier Fire & Security South Africa will operate under its new name, Kidde Fire & Security South Africa, as part of the global realignment of the commercial and residential fire and security business.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Facilities Management Expo brings smart, secure operations to the Cape
Securex South Africa News & Events Facilities & Building Management
As organisations across South Africa navigate the challenges of ageing infrastructure and increased cyber-physical risks, integrated facilities management (FM) solutions have become critical to ensuring operational resilience.

Read more...
Specialised Exhibitions changes name to Montgomery Group Africa
News & Events
This name change reflects the consolidation of Montgomery Group’s regional divisions across Africa under one unified management structure, creating a more agile, efficient, and future-focused organisation.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.