Skip to main content

Security must be built in to future Internet of Things, says Identiv boss

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field. “The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connec
November 5, 2014 Read time: 2 mins
Jason Hart, director and CEO of Identiv

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field.

“The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connected environment is unforgiving to poor security”. Most human beings are essentially lazy, he continues, and if they use the same username and password for all the new connected devices that are starting to appear, their lives will be hugely affected if that username/ password combination is compromised. People will need a ‘trusted ID’ and that ID is likely to come in various formats, such as biometrics and digital certificates. Those certificates, built in to products from the outset, are likely to become much more prevalent. For example, in some countries where pharmaceuticals are widely counterfeited, a vaccine with a built-in digital certificate could be authenticated as genuine by someone with a phone with the appropriate reader. Future security methods have to be made “incredibly simple” to cope with human laziness and weaknesses, says Hart. It is likely, however, that no single system of authentication will cover all types of products or services, so people will need to pick platforms that can handle multiple forms of digital proof.

Related Content

  • Counting the environmental costs of ITS deployment
    October 29, 2015
    David Crawford looks at the latest thinking about calculating the benefits associated with the environmental side of ITS schemes. The penny is dropping that some environmental costs “are being shifted outside the traditional bounds of evaluation methods” for ITS-based road transport projects, according to researchers at the UK University of Leeds’ Institute for Transport Studies.
  • Infrastructure and the autonomous vehicle
    December 12, 2014
    Harold Worrall ponders the effect of autonomous vehicles on transportation infrastructure. For the last century the transportation industry has been focused on the supply of infrastructure to support the ever growing fleet of vehicles and the greater number of miles covered by each vehicle. Our focus has been planning, funding, designing, building and maintaining roadways. Politicians, engineers, planners, financial managers … all of us have had this focus. We have experienced demand growth since the first
  • 10,000 Euro prize for truRating in first-ever CARTES Digital Challenge
    November 5, 2014
    London-based truRating has won the coveted €10,000 prize in the first CARTES SECURE CONNEXIONS Startup Challenge. Georgina Nelson, founder and CEO of the London-based firm, said: “Itís amazing: 10,000 Euro is a huge amount for a start-up.
  • Outsourcing security weakness for Sweden’s driver and vehicle data
    October 24, 2017
    The security of driver and vehicle data hit the headlines this summer in Sweden and its authorities are still dealing with the fallout. David Crawford reports. epercussions from Sweden’s vehicle data outsourcing scandal continue to reverberate. Transportstyrelsen, the government’s transport agency, came under fire this summer for risking the personal security of over five million motorists by failing to implement full security checks on personnel in other countries to whom individual work packages could