https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


open-source-handwritten-

Securing an Open Source OS for IoT

Open source IoT operating systems are popular, but there are complexities for cybersecurity decision makers to address.
  • Written by Callum Cyrus
  • 18th June 2021

These days many operating systems for Internet of Things devices include an open-source license, but vigilance is needed to adequately protect the attack surface.

An ESG survey has indicated 38% of storage decision makers expect IoT workloads to drive on-premises storage spending increases over the next two years. Some 33% of respondents expected cloud spending increases.

The trend means that Internet of Things (IoT) is increasingly finding its way into the chief executive’s itinerary, as part of a renewed emphasis on cybersecurity protection and data security.

A slide deck prepared for IoT World Today by Chris Sherman, senior analyst for cybersecurity at Forrester, suggests around 37% of cybersecurity decision makers believed the greatest operational peril came from embedded IoT solutions in assets or operations, while 33% must contend with protecting embedded IoT in their products.

Going forward, it’s crucial for businesses to integrate open-source environments like Linux effectively, while avoiding security pitfalls that could jeopardize their data security.

:“The operating environment plays a key role in the management of these workloads,” said Paul Nashawaty, senior analyst at ESG Global. “Data growth from these workloads needs to be managed, but how IT vendors address this growth will be determined by the integration of the systems.”

Cybersecurity has been a threat for open source Linux systems. While the nature of the threat fluctuates over time, the incentive for attackers is arguably greater as connected devices have now become ubiquitous and provide a larger attack surface.

On the one hand, the global installed base of IoT devices is set to reach 46 billion by 2021, according to Juniper Research, and that increases the overall attack surface. But there are also a larger number of devices per network. This provides economies of scale to the value of stolen cyber goods. As it takes longer to hijack all nodes in the typical IoT network, multipronged cyber-marauders such as botnets might face something of an opportunity cost, Nashawaty said.

As IoT is pervasive, so are the dangers. One risible fiasco emerged in tech media reports four years ago, when a U.S. casino chain suffered a personal data breach from one of its internet-connected fish tanks.

The potential for breaches with reverberating effects will grow as a deluge of data is anticipated from more advanced IoT data sources, such as artificial intelligence and high-risk security footage.

Already away from the IoT sector there are cases of major firms suffering reputational damage. Nashawaty said: “[The risks include] compromised devices becoming part of a botnet, up to and including data loss. There are definite examples I’ve been given where data exfiltration has occurred via connected devices such as phones or printers.”

Safety First For Your Open Source OS

When selecting a distribution to run on IoT devices, it’s best to opt for open source IoT configurations that are specifically tailored to this environment. It’s also helpful to have the budget to back up your intentions and hire IT specialists that can keep the open source environment running smoothly.

There are plenty of options to choose from. Many Linux distributions are available with a free license, but it’s beneficial to think about which build will offer your IT personnel the most useful remedies when things go wrong.

Open source

Processing constraints will be one of the biggest considerations. The OS should be measured against the specs of an IoT device to ensure that it will run optimally. As the OS will reside on IoT devices, so it’s vital to consider how to control the operating system.

IoT device management software programs allow operational staff to supervise and keep track of each node’s OS. Some options are now offered as part of popular public cloud ecosystems – such as Azure IoT Central and Google Cloud IoT Core.

Some OS options utilize Linux, an open source operating system that’s been around since the 1990s. Linux’s big play has always been endearing clients that prioritize mission-critical cybersecurity – one of its most creditable users globally is the U.S. Department of Defense.

But there are various alternatives that are specifically built from the ground up to work with IoT devices. As such, these might be more effective to implement and operate.

For example, the open-source OS Riot was designed with IoT in mind on the back of a Unix kernel.

It can be executed as part of a Linux-hosted process – for example if your device management software depends on it – but has low power-use capacity and supports software execution across  8-, 16- or 32-bit compute architectures.

Once an OS is set up, ensure that all default usernames and passwords have been changed. This can be forgotten when things get busy on the retail or warehouse floor, and not everyone has easy access to dedicated IT.

“From a device perspective, changing default usernames and passwords sounds obvious, but many continue not to do it” Nashawaty said.

Software vendors targeting the commercial IoT space have worked hard to ensure their products play well with open source OSes. But platforms must remain protected at the IoT operating system level even when compute is carried out at the edge, which involves unique security concerns.

California-based Foghorn provides edge-native software that applies artificial intelligence hosted entirely within the client’s industrial IoT network, without requiring an external internet connection.  The product works with open source IoT platforms to deliver real-time analytics, machine learning and AI capabilities.

“Security at the operating system level has always been important for any deployments, IoT or not,” said Sastry Malladi, chief technology officer at Foghorn.

“Having said that, security at the edge is relatively more important as you are directly connecting to highly expensive machinery and cybersecurity attacks/threats have to be taken very seriously,” he continued.

“Edge devices are not typically connected to any external networks, the threats are limited from an external source. However, the devices need to be protected from internal networks with all the security protection measures we described above.”

Patching Linux Is a Cornerstone of Secure IoT

Nashawaty said that consistent and timely patching of devices is also critical to solidify the open-source IoT environment as new vulnerabilities are discovered.

One important tool is the Common Vulnerabilities and Exposure system, a U.S.-hosted database providing comprehensive information on publicly disclosed computer security flaws.

The goal is to make it easier to share information about known vulnerabilities across organizations; each exposure is given a standardized identifier that can then be recognized and scrutinized by cybersecurity professionals.

IT pros must also take care to implement over-the-air updates with Wi-Fi or mobile broadband technologies – that is intelligent and flexible enough to serve all IoT endpoints.

Unlike proprietary operating systems such as Windows IoT, some open source platforms will lack a centralized patch manager for automatically countering new threats.There is a community of patch update hubs. The benefit is this means your operating system could be continuously secure, but only so long as IT personnel remain plugged in to the flow of information on known exposures.

Check for an open source alternative to Linux with regular security updates more akin to a traditional PC, which might be preferable. For example, Fuschia OS receives regular updates from its publisher Google, but there might be a trade-off in terms of flexibility.

Other open source OS offerings are popular because they enable IoT terminals to be updated remotely – this may be a boon if your network is highly dispersed geographically, or if the device is to be sold to a customer. Huawei’s LightOS, for instance, offers remote updates and has been installed on 50 million IoT devices.

Emerging technologies could change the paradigm of securing data as it passes from open source IoT platforms. Blockchain technology, for example, is regarded as a potentially fail-safe method of encryption, as it distributes authorization across several nodes – a concept known as the digital ledger. IoT-focused blockchain products include Maru, which can be installed on end-points to improve security, identity and interoperability, according to Deloitte.

““Blockchain is not a magic bullet for cybersecurity which is a massive concern for IoT enterprises,” said John Canali, senior analyst at Omdia and service provider IoT strategies.“However, adaptive companies can seek an alternative utilizing blockchain technology as opposed to working with players that focus on a securing a single operating system.”

 

 

 

Tags: Developers Security Technologies

Related


  • IoT Security Firm to Acquire Medical Security Startup
    Claroty is set to acquire Medigate to grow its foothold in securing the Internet of Medical Things
  • Ransomware Attack Could Impact Paychecks
    The Kronos ransomware attack affected the company’s private cloud service over the weekend, knocking it offline just before the holidays
  • Image shows an abstract digital big data concept.
    BotenaGo Malware Targets Millions of IoT Devices
    AT&T Alien Labs identified the malware that has left millions of IoT devices exposed.
  • IoT Startup Raises $10M
    Platform aims to bolster network security with automated device configurations and visibility.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Zero-Trust Security for IoT: Establishing Rigorous Device Defenses
  • AI Ups the Ante for IoT Cybersecurity
  • Protecting Your Network Against Ripple20 Vulnerabilities
  • IoT Security Trends, 2021: COVID-19 Casts Long Shadow

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

Europe’s First Automated Gas Station Convenience Store dlvr.it/SR45J9 https://t.co/eDJDJ7CxkI

25th May 2022
IoTWorldToday, IoTWorldSeries

Zero-Emission, Autonomous Cargo Ship Under Development dlvr.it/SR3xgb https://t.co/3oU7CrKWkW

25th May 2022
IoTWorldToday, IoTWorldSeries

Hannover Messe 2022: 5 Key Themes at This Year’s Show dlvr.it/SR3wtW https://t.co/j0fQUiU2LW

25th May 2022
IoTWorldToday, IoTWorldSeries

Can AI Help Stop Mass Shootings? dlvr.it/SR3tqK https://t.co/VxPBdajWA3

25th May 2022
IoTWorldToday, IoTWorldSeries

China has revealed an autonomous marine drone carrier dlvr.it/SR3qXs https://t.co/yMiiqeMNrZ

25th May 2022
IoTWorldToday, IoTWorldSeries

ISQ’s #UAV inspection drones will be on display at this year’s @hannover_messe dlvr.it/SR35dg https://t.co/U6QOQtMbGw

25th May 2022
IoTWorldToday, IoTWorldSeries

👀 Looking to integrate #AI into your manufacturing process? Explore how #manufacturers can begin the process of… twitter.com/i/web/status/1…

25th May 2022
IoTWorldToday, IoTWorldSeries

The U.S. Army is getting a 5G boost for #AR #VR capabilities from #5G network provider @OceusNetworks.… twitter.com/i/web/status/1…

24th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X