Skip to main content

Security must be built in to future Internet of Things, says Identiv boss

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field. “The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connec
November 5, 2014 Read time: 2 mins
Jason Hart, director and CEO of Identiv

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field.

“The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connected environment is unforgiving to poor security”. Most human beings are essentially lazy, he continues, and if they use the same username and password for all the new connected devices that are starting to appear, their lives will be hugely affected if that username/ password combination is compromised. People will need a ‘trusted ID’ and that ID is likely to come in various formats, such as biometrics and digital certificates. Those certificates, built in to products from the outset, are likely to become much more prevalent. For example, in some countries where pharmaceuticals are widely counterfeited, a vaccine with a built-in digital certificate could be authenticated as genuine by someone with a phone with the appropriate reader. Future security methods have to be made “incredibly simple” to cope with human laziness and weaknesses, says Hart. It is likely, however, that no single system of authentication will cover all types of products or services, so people will need to pick platforms that can handle multiple forms of digital proof.

Related Content

  • Enforcement - still a dirty word?
    February 2, 2012
    A friend of mine's wife used to work on a ladies' magazine. A mid-shelf affair, it would contain the usual round of photo stories on this season's look, interviews with celebrities - some of whom I'd almost heard of - and those 'What does he really think of me?/Why do men act the way they do?' questionnaires.
  • Preventing connected vehicles creating disconnected drivers
    November 12, 2015
    Advanced driver assistance systems (ADAS) are evolving at a rapid pace – but drivers’ ability to cope with them is not and at some point the mismatch must be addressed. Probably the biggest challenge the transportation industry has ever faced.” That is how Dr Bryan Reimer of Massachusetts Institute of Technology AgeLab describes the challenges posed by semi-autonomous vehicles.
  • Debating contactless toll charging by smartphone
    April 25, 2012
    Developments in the mass transit sector could provide indicators of potential for greater use of mobile consumer electronic devices for charging and tolling, according to Consult Hyperion’s Mike Burden. However, opinion among toll system suppliers is divided. Jason Barnes reports The combination of mass-market devices and their protocols, typified by smartphones featuring near field communication (NFC), points to some exciting cross-fertilisation possibilities in the charging and tolling sector, says Consul
  • Q&A: HID GLOBAL
    November 3, 2014
    Harm Radstaak, managing director EMEA with HID Global, talks about layered security and a future in which a single card or phone is all customers need