<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=41671&amp;fmt=gif">

 Tags: Security

There is no doubt that the COVID-19 pandemic put the reliability and security of communications networks under the spotlight as millions of people reverted to work, care, and learn from home, says Steve Buck, SVP product and operations, security business unit at Mobileum. Many have commented that out of necessity, the digital transformation of many industries accelerated more in the last few months than they have in the last few years.

Healthcare, for example, saw dramatic increases in telehealth adoption. The rise of the Internet of Things (IoT) has taken the acceleration of digital transformation in health one step further by supporting digital diagnostics. For example, digital thermometers that can be used to track the spread of the flu in real-time, saw a spike in usage as the pandemic spread in the US. In April, Livongo Health, a provider of remote IoT monitoring solutions for chronic diseases, raised their quarterly guidance, following the increase in adoption of their services spurred on by COVID-19.

Time to reassess security

The rise of IoT adoption has always been viewed as an exciting development in communications services. However, as the adoption of applications increases, such as health monitoring, now is the time for network providers to critically assess the network security implications of IoT devices.

IoT network security is complex. Not only does it involve managing diverse hardware, firmware, operating systems, communications protocols across 3G, 4G/LTE and 5G networks, but the attack plane of your network is 100 times larger than what it was just a few years ago as millions of IoT devices are flooding the market – many with limited or outdated security firmware. And it is already happening today.

A security vulnerability in the Zigbee low-power IoT protocol that is used by Philips Hue smart lights and many other IoT products, for example, was first identified in 2017. Three years later, this same exploit still works. It begs the question every time you switch off the lights at night: is this the light bulb that may launch a distributed denial of service (DDoS) attack and bring down the network?

Added to this, IoT devices may be autonomous, roam, and applied to network slices – which will have their own level of security requirements depending on the industry use case and application. These complexities combined show that old approaches to network security are no longer adequate for IoT.

Three questions to ask yourself

Instead, three critical questions should be asked to determine how secure your network is against IoT vulnerabilities:

- How are your on-net, inbound, and outbound IoT roamers protected from signalling attacks?

- Do you know if the IoT devices are behaving as they should?

- Can you identify if a rogue device is acting in isolation or is part of a wider attack?

Each of these questions points to critical vulnerabilities and clues of nefarious IoT devices. In the case of your subscribers, if someone is driving their autonomous car on your network, you want to ensure that it is not vulnerable to attacks. Similarly, when your devices are roaming on another network, you want to make sure it is protected. This is where multi-protocol signalling firewalls are required to ensure that traffic that traverses between your 3G, 4G, and 5G networks have the proper security protections in place and that your roaming devices are steered to preferred partner networks.

Identify a rogue device

By understanding what the device is and the context of its communications, you can understand if a device is changing its behaviour or if the eSIM/SIM card or device has changed. Changes in behaviour, such as sudden spikes in traffic, can indicate that the device has been taken over by a botnet, for example.

By detecting the changes in behaviour, you can identify the signature of a rogue device and use this to find more devices with the same fingerprint and potentially block them. In addition, by analysing the data the devices are sending with their mobile connectivity information, you will be able to identify if the rogue device is a lone actor or part of a wider, co-ordinated attack.

We are just in the infancy of IoT adoption, and managing these risks and vulnerabilities are only going to become more complex and on a far larger scale. According to Cisco, IoT traffic is on track to account for 50% or approximately 14.7 billion of all networked connections by 2023.

This makes it more pressing for network operators to put the appropriate network security mechanisms in place to ensure they know what IoT devices are on their network, can understand the context of how they should be behaving, and can quickly determine if it is an isolated device or something more sinister.

If you want to learn more, please contact us.

Article previously published on IoT Now.

Signaling Firewall - The First Line of Defense

Subscribe Our Blog

Let Us Know What You Thought about this Post.

Put your Comment Below.

You may also like:

Some thoughts from MWC and the role of 5G security

I am writing this blog from the inside of a British Airways plane, waiting to take off from Barcelona, destined for Lond...

Protecting the two-factor authentication system with signaling security

5G, a network of superlatives in a world of sky-high expectations. Securing your enterprise has never been more importan...

Safely navigating the world of Signaling Security - why Threat Intelligence is critical?

  Mobileum has recently launched its signaling security Threat Intelligence service. Needless to say, we are very proud ...