Skip to main content

Security must be built in to future Internet of Things, says Identiv boss

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field. “The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connec
November 5, 2014 Read time: 2 mins
Jason Hart, director and CEO of Identiv

We have to learn the lessons of the past if we are to make the future Internet of Things (IoT) a safe environment, according to a leading voice in the field.

“The new reality of the world is that the post-password era is with us,” Jason Hart, director and CEO of Identiv, told the CARTES SECURE CONNEXIONS conference. Too often in the past, security has been a late consideration when products or services are designed, he says – but in future, it will “have to be built into the fabric of IoT” because “a connected environment is unforgiving to poor security”. Most human beings are essentially lazy, he continues, and if they use the same username and password for all the new connected devices that are starting to appear, their lives will be hugely affected if that username/ password combination is compromised. People will need a ‘trusted ID’ and that ID is likely to come in various formats, such as biometrics and digital certificates. Those certificates, built in to products from the outset, are likely to become much more prevalent. For example, in some countries where pharmaceuticals are widely counterfeited, a vaccine with a built-in digital certificate could be authenticated as genuine by someone with a phone with the appropriate reader. Future security methods have to be made “incredibly simple” to cope with human laziness and weaknesses, says Hart. It is likely, however, that no single system of authentication will cover all types of products or services, so people will need to pick platforms that can handle multiple forms of digital proof.

Related Content

  • What Citizen Kane can teach transportation engineers
    July 14, 2023
    Andy Boenau suggests that one of the most famous movies of all time might have lessons for our industry. And they’re all about not knowing things...
  • Geotoll’s payment app could be the smart answer to tolling interoperability
    July 30, 2013
    Jon Masters looks at a smartphone app which could be the ‘disruptive technology’ that eases the way to interoperability in tolling systems. Consumer demand may soon drive the biggest step change yet in tolling. In the United States a new start-up company, Geotoll, has launched a smartphone app for electronic toll payment. It is not beyond possibility that rapid growth of the market for smartphones will continue – an estimated 50% of US citizens and 80% of Europeans now have one – and that the Geotoll brand
  • Rapid growth makes Texas an incubator for tolling innovation
    September 8, 2014
    As the IBTTA’s annual meeting and exhibition heads for Austin, Mitchell Beer, president of Smarter Shift, considers the role of Texas in the development of tolling strategies and technology. The State of Texas has always prided itself on being ‘larger than life’. From the sprawling geography of the state itself with its wide open skies, to its entrepreneurial ‘get-it-done’ attitude, Texas exudes an impatient restlessness that pushes businesses and public agencies to deliver faster, better results. More ofte
  • Six easy steps to security
    October 22, 2018
    As security threats become increasingly vast and varied, multinationals are beginning to see the need for an effective global security operations centre to protect their organisation. James I. Chong spells out what is required. You know you need a global security operations centre (GSOC) to support what you’ve built, identify threats, and prevent disasters before they happen - but how do you know if it’s truly effective? There’s no shortage of information coming into operation centres. Too often, it’s the