Skip to main content

Security must be built in to future Internet of Things, says Identiv boss

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field. “The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connec
November 5, 2014 Read time: 2 mins
Jason Hart, director and CEO of Identiv

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field.

“The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connected environment is unforgiving to poor security”. Most human beings are essentially lazy, he continues, and if they use the same username and password for all the new connected devices that are starting to appear, their lives will be hugely affected if that username/ password combination is compromised. People will need a ‘trusted ID’ and that ID is likely to come in various formats, such as biometrics and digital certificates. Those certificates, built in to products from the outset, are likely to become much more prevalent. For example, in some countries where pharmaceuticals are widely counterfeited, a vaccine with a built-in digital certificate could be authenticated as genuine by someone with a phone with the appropriate reader. Future security methods have to be made “incredibly simple” to cope with human laziness and weaknesses, says Hart. It is likely, however, that no single system of authentication will cover all types of products or services, so people will need to pick platforms that can handle multiple forms of digital proof.

Related Content

  • More for less with traffic control centre technology
    May 31, 2013
    Rich pickings are now available in a maturing market supplying screens and processors for traffic management operations. Jon Masters reviews what’s on offer. Competition in supply of technology for traffic management and control centres has increased significantly in recent years. Suppliers introduced better products and customers are changing the way they operate, which benefits traffic authorities and emergency services alike. These are the views of Electrosonic’s control rooms solutions sales manager Pa
  • Good money after bad
    February 27, 2012
    Fundamentally, as human beings, we tend to want much the same things
  • Electronic toll collection delivers efficient traffic regulation
    February 3, 2012
    Electronic tolling systems have been in use for decades now. Worldwide, steadily more and more tolling systems are being set into operation, providing efficient means for traffic regulation and financing of infrastructure. But despite this maturity enforcement is still not being given the consideration it deserves. Q-Free's Steinar Furan writes
  • Enforcement needs automation and communication
    February 1, 2012
    TISPOL's Peter van de Beek questions whether the thought processes which drive enforcement technology development are always the right ones. Peter van de Beek sees an ever-greater role for technology in traffic enforcement but is concerned that the emphasis of technological development and discussion is not always in the right places. 'Old-fashioned' face-to-face policing remains as valid as it ever did, he feels, but adds that there should be greater communication with those engaged at the sharp end of saf