Sure disaster: How not to do the Internet of things

Network security shouldn't be a lowest-common-denominator game played by inexperienced manufacturers

We're hearing a lot about the Internet of things these days. It's the long-promised utopia where our alarm clocks and refrigerators are all Internet-enabled and working magic on our behalf. Further on down the road, anything else we can imagine will be able to talk to hosted service platforms in the cloud and send all kinds of data back and forth. How else would we update the firmware in our recliner?

(NB: I couldn't actually find a connected recliner, but I'm sure one is right around the corner with a companion smartphone app that lets you set heat and massage preferences, and potentially even take you on a little trip to the kitchen for another beer.)

[ Also reviewed on InfoWorld: Fluke reinvents handheld network testing | PathSolutions solves the network monitoring maze | Pick up expert networking how-to advice from InfoWorld's Networking Deep Dive PDF special report and Technology: Networking newsletter. ]

Besides the wholesale connectedness, we're also seeing an odd twist on technology integration -- that is, it's happening backward. Previous to the IoT, we had technology companies adding high-tech workings to ordinary objects. That is vastly different than manufacturing companies trying to add high-tech workings to ordinary objects -- and it's how you wind up with a security and functionality nightmare.

Case in point: I recently had to deal with a home automation and management system of a significant size and pedigree. This system had grown up through the years, evolving from your basic room-based command-and-control wall panels to dedicated remote controls and eventually to smartphone and tablet control. The most recent integration was network connectivity. This was clearly required for smartphone and tablet control, as well as general Web app control over the entire system.

This should have been a very straightforward move -- toss an embedded Linux system in a control box, build an API and a Web app, and connect the thing to a LAN with a wired or wireless interface. Using an embedded Linux distro would cover nearly all the basic needs, leaving the API and app dev portions as the major hurdles to this endeavor. With Linux, you don't have to worry about a network stack, a kernel, device drivers, app servers -- none of it. Just build your app and go.

I'm still not sure what happened, but this was a clear case of extremely poor planning and execution. Somehow this manufacturer developed a system that lacked the ability to assign a static IP (or any IP information whatsoever), had not a single concept of security, and cost a bundle. Accessing the Web application required no username or password, and there were no user authorization levels. The suggested method for remote monitoring and control of the system was to open a port in the firewall to the controller's IP.

To recap, if you wanted to remotely monitor the cameras, remotely control the lights and thermostats, or remotely access any other aspects of the system, you had to expose the entire management interface to everyone on the Internet. If you open that firewall port, anyone on the planet could watch you through your own cameras and control your lights and thermostats. That's assuming the controller kept its DHCP-assigned IP address mapped through the firewall; if the system rebooted and the address changed, this would break, as would other control elements.

The whole setup was ludicrous. It was an example of an organization with much experience in one industry trying to bolt on dangerously insecure and mystifyingly incomplete technology from another. It is truly frightening.

So it will be with many "things" in the Internet of things. Companies that have little to no experience with anything requiring an IP stack will pump out products that will be built in bizarre ways, will do bizarre things, and will be blithely used by people who have no reason to know better.

It's bad enough that nontechies have to worry about securing their own Wi-Fi networks with purpose-built access points and firewalls. Now they have to worry that a security flaw in their microwave's Wi-Fi implementation will let anyone in range jump on their network with no credentials.

Anyone who's sitting in "tech" meetings right now, discussing how best to strap an IP stack on a "thing" that has never had one before -- I implore you to seek out companies that build these goods for a living, and don't try to build your own right away. The world will thank you for it.

This story, "Sure disaster: How not to do the Internet of things," was originally published at InfoWorld.com. Read more of Paul Venezia's The Deep End blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.

Join the discussion
Be the first to comment on this article. Our Commenting Policies