broken image
broken image
GET IN TOUCH
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
broken image
broken image
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
GET IN TOUCH
broken image

IoT Security & Smart Cities

· Technical and Security Deep Dives

Smart cities may sound like a thing of the future, but we’re approaching the realization of that concept with the use of IoT devices. When they create complex, city-wide grids that are strongly centralized, they can provide great convenience to the people using them. But they also inherently grow more vulnerable.

How does this bode for the future in which the UN predicts 70% of the world’s population will move to cities? By 2050, we might have these IoT systems developed to greatly benefit the citizens by reducing costs and decreasing the infrastructural strain. But how can we protect them?

Global Smart City Projects and Devices They Use

Global spending on smart city projects in 2018 was more than $80 billion, which is a significant sum that clearly shows the dedication of governments and municipalities to improve city functionality around the world. A city’s IoT grid has to be centralized to be sufficiently interconnected. A smart city requires more than isolated grids, but this requirement makes it vulnerable.

When we take into consideration how different some of these smart city projects are and the variety of IoT devices that are used today, it becomes clear why these systems are so difficult to secure. Without a unifying cybersecurity standard for all IoT devices, as well as built-in protection, it’s extremely difficult and not cost-effective to secure separate systems. As they are all connected in a smart city grid anyway, one weak link could spell trouble for all the others.

Vulnerabilities of IoT in Smart Cities

Since every device can be an entry point capable of undermining the security of the whole system, we need to take a closer look at specific vulnerabilities of smart city IoT systems. Once one device is compromised, it’s possible to extract its confidential data, disrupt its functionality, or use it to infiltrate the network further.

An interconnected smart city grid has a lot of different segments, and they all use the same or similar protocols to communicate. These are usually M2M protocols, which are extremely vulnerable to cyberattacks.

Ensuring IoT Security in Smart Cities

To ensure the required level of security of interconnected IoT devices in smart cities, we need to approach the cybersecurity issue on multiple levels. The first step is a comprehensive analysis of our systems, uses and weaknesses of individual devices, and how they are going to develop in the future.

That should provide us with the insights we need to come up with a thorough and all-encompassing cybersecurity certification that every IoT device should possess before being approved for use. For some, that might mean some built-in protection, while others would likely be protected by following standard cybersecurity practices.

Finally, we need to ensure ongoing device monitoring with the purpose of active, real-time protection. Devices that are often used as attacker entry points should be able to detect intrusion and protect against it.

Towards a Safer Future

As cities begin to rely on IoT devices more and more to ensure improved functionality, IoT developers and manufacturers need to worry about making IoT devices more secure. Only that will ensure that we walk into the future, not fearing cybercrime, but defeating it.

Subscribe
Previous
IoT Security & Physical Safety
Next
IoT Security at Home
 Return to site
Profile picture
Cancel
Cookie Use
We use cookies to improve browsing experience, security, and data collection. By accepting, you agree to the use of cookies for advertising and analytics. You can change your cookie settings at any time. Learn More
Accept all
Settings
Decline All
Cookie Settings
Necessary Cookies
These cookies enable core functionality such as security, network management, and accessibility. These cookies can’t be switched off.
Analytics Cookies
These cookies help us better understand how visitors interact with our website and help us discover errors.
Preferences Cookies
These cookies allow the website to remember choices you've made to provide enhanced functionality and personalization.
Save