Skip to main content

Security must be built in to future Internet of Things, says Identiv boss

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field. “The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connec
November 5, 2014 Read time: 2 mins
Jason Hart, director and CEO of Identiv

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field.

“The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connected environment is unforgiving to poor security”. Most human beings are essentially lazy, he continues, and if they use the same username and password for all the new connected devices that are starting to appear, their lives will be hugely affected if that username/ password combination is compromised. People will need a ‘trusted ID’ and that ID is likely to come in various formats, such as biometrics and digital certificates. Those certificates, built in to products from the outset, are likely to become much more prevalent. For example, in some countries where pharmaceuticals are widely counterfeited, a vaccine with a built-in digital certificate could be authenticated as genuine by someone with a phone with the appropriate reader. Future security methods have to be made “incredibly simple” to cope with human laziness and weaknesses, says Hart. It is likely, however, that no single system of authentication will cover all types of products or services, so people will need to pick platforms that can handle multiple forms of digital proof.

Related Content

  • November 3, 2014
    Eurosmart says hyper-connected era about to begin
    A new, ‘hyper-connected’ era will bring a wealth of benefits in the next five years, says Brussels-based Smart Security industry body Eurosmart - but it will also pose security and privacy challenges to which the industry can rise. According to its Vision 2020 report, there is no sign of the strong demand for smart devices and cards slowing in 2015.
  • November 3, 2014
    CARTES SECURE CONNEXIONS 2014: ‘Users on the move’
    A warm welcome from Isabelle Alfano, exhibition director, CARTES SECURE CONNEXIONS Network ‘Users on the move’ is the central theme of this year’s show. A great number of services, devices and systems are built around a new way of life made to fit users’ mobility.
  • May 6, 2020
    Don’t forget security threat, says Econolite
    A new level of communication is helping deliver on the promise of Vision Zero and a more sustainable future. But amid the promise, Econolite’s Sunny Chakravarty suggests we need to be mindful of the potential downsides in an age of mass connectivity
  • May 14, 2018
    The rise of V2X: it’s time for ITS to put up the shields in cyberspace
    Traffic management has largely been shielded from the sort of malicious hacking that is commonplace in other industries – but with billions of connected devices in the world it won’t stay that way, warn internet experts Keith Golden and Brandon Johnson. Traditionally isolated from networks and the internet over most of its history, the traffic management industry has largely been shielded from malicious hacking and system intrusion that have become commonplace in other industries. However, as the rate of