Skip to main content

Security must be built in to future Internet of Things, says Identiv boss

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field. “The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connec
November 5, 2014 Read time: 2 mins
Jason Hart, director and CEO of Identiv

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field.

“The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connected environment is unforgiving to poor security”. Most human beings are essentially lazy, he continues, and if they use the same username and password for all the new connected devices that are starting to appear, their lives will be hugely affected if that username/ password combination is compromised. People will need a ‘trusted ID’ and that ID is likely to come in various formats, such as biometrics and digital certificates. Those certificates, built in to products from the outset, are likely to become much more prevalent. For example, in some countries where pharmaceuticals are widely counterfeited, a vaccine with a built-in digital certificate could be authenticated as genuine by someone with a phone with the appropriate reader. Future security methods have to be made “incredibly simple” to cope with human laziness and weaknesses, says Hart. It is likely, however, that no single system of authentication will cover all types of products or services, so people will need to pick platforms that can handle multiple forms of digital proof.

Related Content

  • Plate matching technology more accurate than conventional OCR
    February 3, 2012
    EngiNe srl's patented Plate Matching technique is something of a paradox, in that it achieves formal vehicle identification without recognising, in the accepted sense, the characters on its number plate. Here, Angelo Dionisi of ENG Group explains how it works
  • Cooperative systems and privacy not mutually exclusive
    February 1, 2012
    Are co-operative systems and personal privacy mutually exclusive? Not necessarily, says Neil Hoose. But the more advanced the application, the greater the concession of privacy may have to become. ITS Stockholm in 2009 and the Cooperative Mobility Showcase event which took place alongside Intertraffic in Amsterdam in March this year both featured live, on-street demonstrations of safety and driver information applications that used Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communications,
  • Cooperative systems and privacy not mutually exclusive
    February 6, 2012
    Are co-operative systems and personal privacy mutually exclusive? Not necessarily, says Neil Hoose. But the more advanced the application, the greater the concession of privacy may have to become
  • Does ADAS create as many problems as it solves
    September 23, 2014
    Victoria Banks and Neville Stanton [1] of Southampton University’s Transportation Research Group examine the real impact of creeping driver automation. Safety research suggests that 90% of accidents are thought to be a result of driver inattentiveness to unpredictable or incomplete information and the vision is that highly automated vehicles will lead to accident-free driving in the future.