Skip to main content

Security must be built in to future Internet of Things, says Identiv boss

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field. “The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connec
November 5, 2014 Read time: 2 mins
Jason Hart, director and CEO of Identiv

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field.

“The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connected environment is unforgiving to poor security”. Most human beings are essentially lazy, he continues, and if they use the same username and password for all the new connected devices that are starting to appear, their lives will be hugely affected if that username/ password combination is compromised. People will need a ‘trusted ID’ and that ID is likely to come in various formats, such as biometrics and digital certificates. Those certificates, built in to products from the outset, are likely to become much more prevalent. For example, in some countries where pharmaceuticals are widely counterfeited, a vaccine with a built-in digital certificate could be authenticated as genuine by someone with a phone with the appropriate reader. Future security methods have to be made “incredibly simple” to cope with human laziness and weaknesses, says Hart. It is likely, however, that no single system of authentication will cover all types of products or services, so people will need to pick platforms that can handle multiple forms of digital proof.

Related Content

  • Tighten up on cyber security before hackers infiltrate ITS infrastructure
    October 19, 2015
    This year’s ITS World Congress in Bordeaux will have three sessions dedicated to cyber security and the issue will also be addressed under connected and automated vehicles categories. Jon Masters finds out why. American security researchers Charlie Miller and Chris Valasek attracted international press coverage recently when they demonstrated how they could hack into and take control of a vehicle from a remote laptop. While the implications are clearly serious for vehicle manufacturers, highway and transpor
  • ITS industry needs more effort to get to the future
    January 19, 2012
    Eric Sampson, visiting professor at Newcastle University and City University London and ambassador for ITS-UK, provides a retrospective on the last couple of decades and takes a look at what the ITS industry still needs to do to get to where it needs to be
  • Debating the future of in-vehicle systems
    December 6, 2012
    Industry experts talk to Jason Barnes about the legislative situation of current and future in-vehicle systems. Articles about technology development can have a tendency to reference Moore’s Law with almost indecent regularity and haste but the fact remains that despite predictions of slow-down or plateauing, the pace remains unrelenting. That juxtaposes with a common tendency within the ITS industry: to concentrate on the technology and assume that much else – legislation, business cases and so on – will m
  • Selecting the right camera for safety or security
    January 30, 2012
    Machine vision systems offer great variety of function and performance. Teledyne DALSA product manager Manuel Romero describes 10 key criteria to aid selection of advanced camera technology for safety or security applications. There are many ways in which machine vision systems can enhance safety and security in transportation, but the ultimate results will only be as good as the image produced. Success relies on correct selection of the camera of such systems, as the features and performance required vary