As more devices get networked, firms that build or connect them must ensure security

Jun 17, 2011 By Victor Godinez

Telecom equipment maker Ericsson has famously predicted there will be 50 billion devices connected to data networks by 2020.

Those connected devices won't include just computers and smartphones, but cars, homes and industrial devices, constantly sending and receiving a flood of data.

That convenience comes with a potential dark side.

For hackers, and even armies, all those newly networked machines represent billions of new targets for mischief, thievery and assault.

"We understand that as our lives move into a completely digital connected world, it has to be secure and safe," said Geoff Hollingworth, Ericsson's Plano, Texas,-based head of Internet protocol services strategy for North America.

"It's no different than the real world, where you have to feel you can move down the street and not get attacked."

The problem will be much broader than securing your laptop or even your smartphone.

Soon, the car in your garage, the electrical meter on the side of your home, the products you buy at the store, and the industrial controls at the factory that made those products will all be connected to various networks and the Internet.

And each new networked device is a potential entry point for a hacker.

Addison, Texas,-based Revere Security Corp. develops security software for that new wave of connected devices.

About a year ago, the company moved from perfecting its algorithms to pitching its products to customers, which include everything from the U.S. military to power companies.

One of Revere's biggest opportunities is in the new wave of high-tech smart power meters.

"The industry is luckily moving toward security controls on smart meters," said Chris Hanebeck, vice president of product management and marketing at Revere.

Dallas-based power line operator Oncor has installed about 1.7 million digital in Texas over the last year or so, and its goal is 3.4 million by the end of 2012.

The technology has benefits for both consumers and electricity providers.

For example, if you have a smart meter, you can go to to see nearly real-time data on your electricity usage.

And your provider can turn your power on and off with the flick of a software switch, rather than spending hundreds of dollars to dispatch trucks and technicians to individual homes.

But the high-tech meters are much more like minicomputers than the simple measuring devices they're replacing.

So Oncor now has to focus on digital security in a way it never had to before.

"When we started this project, from Day 1 we have foundationally built this with securing the system and securing the data in mind," said Oncor chief technology officer Mark Carpenter.

Carpenter said Oncor uses layers of security, including encryption, firewalls and data traffic monitoring, to keep bad guys from tapping into its meters.

"While no system is 100 percent impenetrable, we have designed our systems such that we can isolate events and situations to affect the minimum portion of the system, if they were to occur," he said.

Why would someone want to hack a smart meter?

Hanebeck at Revere said the motivation can range from simple vandalism - turning someone's power off - to economic sabotage against a power company or a full-scale cyber assault on a country.

And many of these new devices are being wirelessly connected, so an attacker rarely or never has to physically connect with the device.

All the damage is done over Wi-Fi.

Part of the challenge in securing this new wave of connected devices is that unlike PCs and now smartphones with beefy processors and memory to burn, hardware capacity is at a premium.

With a smart meter or a paper-thin radio-frequency identification chip slapped on a shipping pallet, the security has to be both lightweight and strong.

Another area where tech experts have had to rethink network security is in cars.

Ford Motor Co.'s Sync software, for example, pushes everything, from turn-by-turn driving directions to news and sports info, wirelessly to its cars.

So far, the company hasn't seen hackers trying to break into that data network.

But data security was built into Sync from the ground up.

Rich Strader, director of Ford information technology safety and security, said one way the company manages security is by keeping critical safety systems in a car on a different network from other functions.

"Some of these [systems] are dedicated to controlling critical functions of the vehicle - such as power train controls, safety systems, etc.," he wrote in an email.

"These dedicated computers can only be updated by an authorized Ford dealer to ensure a high level of safety and security for our customers. Our consumer-based systems - such as the part of Sync that controls the audio functions and performs voice recognition - can be updated by a USB interface."

Strader noted that it is possible to wirelessly push updates automatically to Sync-enabled cars without users noticing, but so far Ford has opted not to do that, letting customers pick the updates they want to install.

Work in the auto industry has also begun on wireless networks that would be devoted solely to safety and traffic control.

For example, a car that has to brake abruptly in heavy traffic would send an instant alert to vehicles behind it, so each driver could know they might have to come to a sudden stop.

This "network for cars" would require an even heavier security focus, Strader said.

"Ford is part of a consortium of vehicle (original equipment manufacturers) that have been working with the U.S. Department of Transportation and the Department of Homeland Security to design vehicle-to-vehicle and vehicle-to-infrastructure communications that provide these capabilities reliably and affordably," he said.

"In addition, Ford plans to combine inputs from both the wireless network and onboard vehicle sensors to ensure proper behavior of our in-vehicle systems."

Hollingworth at Ericsson said many consumers are rushing to embrace the convenience of these new connected devices.

But unlike with computers and phones, the security of these new devices is almost completely out of the hands of the individual users.

So it's up to the companies building and connecting them to make sure they're safe.

"The benefits of connectivity are so large that people are trusting the technology, and we want to make sure that trust is well-founded," he said.

Explore further: Hand out money with my mobile? I think I'm ready

5 /5 (1 vote)
add to favorites email to friend print save as pdf

Related Stories

Report: 'Smart' meters have security holes

Mar 26, 2010

(AP) -- Computer-security researchers say new "smart" meters that are designed to help deliver electricity more efficiently also have flaws that could let hackers tamper with the power grid in previously ...

Security researchers offer caution on smart grids

Jul 31, 2009

(AP) -- The race to build a "smarter" electrical grid could have a dark side. Security experts are starting to show the dangers of equipping homes and businesses with new meters that enable two-way communication with utilities.

Cisco CEO to use 'holistic' security

Feb 17, 2006

Network security is evolving from a "pinpoint" system of attacking isolated threats to a large-scale "holistic" approach to security, said John Chambers, CEO of Cisco Systems, at the 2006 RSA Conference.

Recommended for you

Hand out money with my mobile? I think I'm ready

14 hours ago

A service is soon to launch in the UK that will enable us to transfer money to other people using just their name and mobile number. Paym is being hailed as a revolution in banking because you can pay peopl ...

Quantenna promises 10-gigabit Wi-Fi by next year

Apr 16, 2014

( —Quantenna Communications has announced that it has plans for releasing a chipset that will be capable of delivering 10Gbps WiFi to/from routers, bridges and computers by sometime next year. ...

Tech giants look to skies to spread Internet

Apr 16, 2014

The shortest path to the Internet for some remote corners of the world may be through the skies. That is the message from US tech giants seeking to spread the online gospel to hard-to-reach regions.

Wireless industry makes anti-theft commitment

Apr 16, 2014

A trade group for wireless providers said Tuesday that the biggest mobile device manufacturers and carriers will soon put anti-theft tools on the gadgets to try to deter rampant smartphone theft.

Dish Network denies wrongdoing in $2M settlement

Apr 15, 2014

The state attorney general's office says Dish Network Corp. will reimburse Washington state customers about $2 million for what it calls a deceptive surcharge, but the satellite TV provider denies any wrongdoing.

Netflix's Comcast deal improves quality of video

Apr 14, 2014

Netflix's videos are streaming through Comcast's Internet service at their highest speeds in the past 17 months now that Netflix is paying for a more direct connection to Comcast's network.

User comments : 0

More news stories

Hackathon team's GoogolPlex gives Siri extra powers

( —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Better thermal-imaging lens from waste sulfur

Sulfur left over from refining fossil fuels can be transformed into cheap, lightweight, plastic lenses for infrared devices, including night-vision goggles, a University of Arizona-led international team ...

Chronic inflammation linked to 'high-grade' prostate cancer

Men who show signs of chronic inflammation in non-cancerous prostate tissue may have nearly twice the risk of actually having prostate cancer than those with no inflammation, according to results of a new study led by researchers ...