SlideShare a Scribd company logo
1 of 3
Download to read offline
The day is not far when virtually all the
electronic devices from phone to cars from
refrigerators to light switches will be
connected to internet and will create a huge
network of communication to make our life
easier. But are we really prepared for this?
Are we prepared
for IoT?
Rathoud, Sameer
If futurists are right, we are going to enter
in an era where all the physical objects we
interact with on our daily basis, will gather
the data through sensors, connect to
internet and communicate with each other
through the buzzword and sci-fi movie worth
concept Internet of Things (IoT).
Optimist believes soon these daily usable
object will become intelligent and will make
our life easy. Tomorrow a refrigerator may
suggest you a recipe by looking at the
content in it. A light may get dim when you
are feeling sleepy. Your shoes may monitor
your health and suggest how much calorie
you should burn or even may be your shoes
will tell, how much calorie your friend has
burned. Your dress will monitor your health.
Our highways will be safer. Our house will be
more efficient. And may be every single idea
will become true with IoT tomorrow.
With IoT the devices will be connected to
various sensors. Through these sensors they
collect lot of data, analyze these data and
provide suggestion or take some action
based on the conclusion of data analysis.
But there might be the chances that the data
captured by these intelligent devices or data
flowing across the internet are highly
sensitive and private and by considering
privacy and security as stand these devices
provide a highly vulnerable point to hackers.
Instead of making our life easy as supposed
to be by these IoT devices, it can create
security havoc.
Few years back an incident came in notice,
where a malware worm named “Stuxnet”,
which was designed to attack industrial
programmable logic controller (PLC). PLCs
allow the automation of electromechanical
processes such as those used to control
machinery on factory assembly lines,
amusement rides, or centrifuges for
separating nuclear material. Exploiting four
zero-day flaws, Stuxnet functions by
targeting machines using the Microsoft
Windows operating system and networks,
then seeking out Siemens Step7 software.
Stuxnet reportedly compromised Iranian
PLCs, collecting information on industrial
systems and causing the fast-spinning
centrifuges to tear themselves apart.
Stuxnet’s design and architecture are not
domain-specific and it could be tailored as a
platform for attacking modern SCADA and
PLC systems.
Stuxnet reportedly ruined almost one-fifth
of Iran's nuclear centrifuges.
You can find more information on stuxnet at
http://en.wikipedia.org/wiki/Stuxnet.
Although this example is not directly
portraying the vulnerability of IoT data. But
with this example we can imagine how badly
a malware can hurt any program.
Take another example where an intelligent
cooking range is supposed to do some basic
pre-processing before I reach home. And a
malware in my intelligent device can even
influence my house’s fire safety and can
burn my house.
We can anticipate an attack of the things,
when new connected devices cause
problems on networks in a variety of ways
including increasing network attack surface
(every new "thing" is a potential hackable
weak point), using up precious bandwidth,
generating mountains of sensitive data that
needs to be stored and secured, and usable
IP addresses as billions of new things
connect to networks worldwide.
Capturing the data from our intelligent
device’s sensors will be ok, until I am not
providing the intelligence to the controllers
as well or our data security system for these
IoT devices should be sound enough that I
can rely on the actions of my controller as
well.
May be tomorrow I will be flooded with
suggestions from my IoT devices, but
preferably I would like to own the actions
rather than these intelligent devices do it for
me (at least for now).
I don’t want to be very pessimist and we can
choose to ignore the impending onslaught of
ubiquitous connected devices. While this
might be OK for now, we can’t keep our head
in the sand for much longer by just thinking
of a TRAP!

More Related Content

What's hot

IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics OverviewKarthik Sarma
 
How IoT & Smart Home Automation Will Change the Way We Live
How IoT & Smart Home Automation Will Change the Way We LiveHow IoT & Smart Home Automation Will Change the Way We Live
How IoT & Smart Home Automation Will Change the Way We LiveTriState Technology
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAkhash Kumar
 
Internet of things
Internet of things Internet of things
Internet of things BilalAteeq3
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?Yasmin AbdelAziz
 
Create the Internet of Your Things with Microsoft Azure IoT
Create the Internet of Your Things with Microsoft Azure IoTCreate the Internet of Your Things with Microsoft Azure IoT
Create the Internet of Your Things with Microsoft Azure IoTStefano Tempesta
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET Journal
 
AI and Machine Learning for the Connected Home with Stephen Galsworthy
AI and Machine Learning for the Connected Home with Stephen GalsworthyAI and Machine Learning for the Connected Home with Stephen Galsworthy
AI and Machine Learning for the Connected Home with Stephen GalsworthyDatabricks
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...AkshetPatel
 
Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home Khwaja Aamer
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
Iot presentation [bitheads]
Iot presentation [bitheads]Iot presentation [bitheads]
Iot presentation [bitheads]Ian Skerrett
 
A Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - ApptunixA Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - ApptunixApptunix
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...IRJET Journal
 

What's hot (19)

IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 
How IoT & Smart Home Automation Will Change the Way We Live
How IoT & Smart Home Automation Will Change the Way We LiveHow IoT & Smart Home Automation Will Change the Way We Live
How IoT & Smart Home Automation Will Change the Way We Live
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
 
Internet of things
Internet of things Internet of things
Internet of things
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?
 
Create the Internet of Your Things with Microsoft Azure IoT
Create the Internet of Your Things with Microsoft Azure IoTCreate the Internet of Your Things with Microsoft Azure IoT
Create the Internet of Your Things with Microsoft Azure IoT
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
 
AI and Machine Learning for the Connected Home with Stephen Galsworthy
AI and Machine Learning for the Connected Home with Stephen GalsworthyAI and Machine Learning for the Connected Home with Stephen Galsworthy
AI and Machine Learning for the Connected Home with Stephen Galsworthy
 
Kuyashii p pt
Kuyashii p ptKuyashii p pt
Kuyashii p pt
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
Smart kitchen
Smart kitchenSmart kitchen
Smart kitchen
 
Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
Io t
Io tIo t
Io t
 
Iot presentation [bitheads]
Iot presentation [bitheads]Iot presentation [bitheads]
Iot presentation [bitheads]
 
A Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - ApptunixA Quick Guide for Internet of Things - Apptunix
A Quick Guide for Internet of Things - Apptunix
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 

Viewers also liked

Caderno de oritenção metodologica
Caderno de oritenção metodologicaCaderno de oritenção metodologica
Caderno de oritenção metodologicaJosete Sampaio
 
Úprava vody v bazénu
Úprava vody v bazénuÚprava vody v bazénu
Úprava vody v bazénuARIVAcz
 
Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1
Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1
Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1Chuong Nguyen
 
생명윤리기본법 초안 (2000년 초중반)
생명윤리기본법 초안 (2000년 초중반)생명윤리기본법 초안 (2000년 초중반)
생명윤리기본법 초안 (2000년 초중반)여성환경연대
 
Terapiadeaceptacinycompromiso
Terapiadeaceptacinycompromiso Terapiadeaceptacinycompromiso
Terapiadeaceptacinycompromiso Willian Rios
 
02 luat ban hanh van ban quy pham phap luat (dan)
02 luat ban hanh van ban quy pham phap luat (dan)02 luat ban hanh van ban quy pham phap luat (dan)
02 luat ban hanh van ban quy pham phap luat (dan)tuanpro102
 
8 M I N U T O S
8 M I N U T O S8 M I N U T O S
8 M I N U T O SAsei Sv
 
Sản phẩm
Sản phẩmSản phẩm
Sản phẩmMira Koi
 
Fiesta del miedo
Fiesta del miedoFiesta del miedo
Fiesta del miedoValladolid
 
Індекс публічності 2014 Хмельницький
Індекс публічності 2014 ХмельницькийІндекс публічності 2014 Хмельницький
Індекс публічності 2014 Хмельницькийkmportal
 
Big data and you
Big data and youBig data and you
Big data and youUpstarts.tv
 
Benh ly bang quang
Benh ly bang quangBenh ly bang quang
Benh ly bang quangNguyen Binh
 
Dexter y dee dee. horacio german garcia
Dexter y dee dee. horacio german garciaDexter y dee dee. horacio german garcia
Dexter y dee dee. horacio german garciaRobertoOtazu
 

Viewers also liked (19)

Caderno de oritenção metodologica
Caderno de oritenção metodologicaCaderno de oritenção metodologica
Caderno de oritenção metodologica
 
Úprava vody v bazénu
Úprava vody v bazénuÚprava vody v bazénu
Úprava vody v bazénu
 
Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1
Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1
Kỹ năng tham gia Hội Chợ Triển Lãm Đà Nẵng Workshop P1
 
생명윤리기본법 초안 (2000년 초중반)
생명윤리기본법 초안 (2000년 초중반)생명윤리기본법 초안 (2000년 초중반)
생명윤리기본법 초안 (2000년 초중반)
 
Terapiadeaceptacinycompromiso
Terapiadeaceptacinycompromiso Terapiadeaceptacinycompromiso
Terapiadeaceptacinycompromiso
 
02 luat ban hanh van ban quy pham phap luat (dan)
02 luat ban hanh van ban quy pham phap luat (dan)02 luat ban hanh van ban quy pham phap luat (dan)
02 luat ban hanh van ban quy pham phap luat (dan)
 
8 M I N U T O S
8 M I N U T O S8 M I N U T O S
8 M I N U T O S
 
Question 2
Question 2Question 2
Question 2
 
Sản phẩm
Sản phẩmSản phẩm
Sản phẩm
 
Periodic table
Periodic tablePeriodic table
Periodic table
 
Hsk test 2012
Hsk test 2012Hsk test 2012
Hsk test 2012
 
Augere folder
Augere   folderAugere   folder
Augere folder
 
Fiesta del miedo
Fiesta del miedoFiesta del miedo
Fiesta del miedo
 
Індекс публічності 2014 Хмельницький
Індекс публічності 2014 ХмельницькийІндекс публічності 2014 Хмельницький
Індекс публічності 2014 Хмельницький
 
47 2013
47  201347  2013
47 2013
 
Big data and you
Big data and youBig data and you
Big data and you
 
Benh ly bang quang
Benh ly bang quangBenh ly bang quang
Benh ly bang quang
 
Dexter y dee dee. horacio german garcia
Dexter y dee dee. horacio german garciaDexter y dee dee. horacio german garcia
Dexter y dee dee. horacio german garcia
 
Policy+webinar+vn
Policy+webinar+vnPolicy+webinar+vn
Policy+webinar+vn
 

Similar to AreWePreparedForIoT

Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)Harsha Siva Sai
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptxNabhanNajeeb1
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxrupasharma39
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve ThemInnofied Solution
 
Principles of research article 23 july 2021
Principles of research article 23 july 2021Principles of research article 23 july 2021
Principles of research article 23 july 2021JOENEMUKWEVHO
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfShubhamYadav73126
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 

Similar to AreWePreparedForIoT (20)

Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
internet of things
internet of thingsinternet of things
internet of things
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them
 
Principles of research article 23 july 2021
Principles of research article 23 july 2021Principles of research article 23 july 2021
Principles of research article 23 july 2021
 
What Is Internet of Things?
What Is Internet of Things?What Is Internet of Things?
What Is Internet of Things?
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
1. IoT.pptx
1. IoT.pptx1. IoT.pptx
1. IoT.pptx
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
iot.docx
iot.docxiot.docx
iot.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 

More from Sameer Rathoud

Observer design pattern
Observer design patternObserver design pattern
Observer design patternSameer Rathoud
 
Decorator design pattern (A Gift Wrapper)
Decorator design pattern (A Gift Wrapper)Decorator design pattern (A Gift Wrapper)
Decorator design pattern (A Gift Wrapper)Sameer Rathoud
 
Memory Management C++ (Peeling operator new() and delete())
Memory Management C++ (Peeling operator new() and delete())Memory Management C++ (Peeling operator new() and delete())
Memory Management C++ (Peeling operator new() and delete())Sameer Rathoud
 
Proxy design pattern (Class Ambassador)
Proxy design pattern (Class Ambassador)Proxy design pattern (Class Ambassador)
Proxy design pattern (Class Ambassador)Sameer Rathoud
 
Builder Design Pattern (Generic Construction -Different Representation)
Builder Design Pattern (Generic Construction -Different Representation)Builder Design Pattern (Generic Construction -Different Representation)
Builder Design Pattern (Generic Construction -Different Representation)Sameer Rathoud
 
Factory method pattern (Virtual Constructor)
Factory method pattern (Virtual Constructor)Factory method pattern (Virtual Constructor)
Factory method pattern (Virtual Constructor)Sameer Rathoud
 
Singleton Pattern (Sole Object with Global Access)
Singleton Pattern (Sole Object with Global Access)Singleton Pattern (Sole Object with Global Access)
Singleton Pattern (Sole Object with Global Access)Sameer Rathoud
 

More from Sameer Rathoud (8)

Platformonomics
PlatformonomicsPlatformonomics
Platformonomics
 
Observer design pattern
Observer design patternObserver design pattern
Observer design pattern
 
Decorator design pattern (A Gift Wrapper)
Decorator design pattern (A Gift Wrapper)Decorator design pattern (A Gift Wrapper)
Decorator design pattern (A Gift Wrapper)
 
Memory Management C++ (Peeling operator new() and delete())
Memory Management C++ (Peeling operator new() and delete())Memory Management C++ (Peeling operator new() and delete())
Memory Management C++ (Peeling operator new() and delete())
 
Proxy design pattern (Class Ambassador)
Proxy design pattern (Class Ambassador)Proxy design pattern (Class Ambassador)
Proxy design pattern (Class Ambassador)
 
Builder Design Pattern (Generic Construction -Different Representation)
Builder Design Pattern (Generic Construction -Different Representation)Builder Design Pattern (Generic Construction -Different Representation)
Builder Design Pattern (Generic Construction -Different Representation)
 
Factory method pattern (Virtual Constructor)
Factory method pattern (Virtual Constructor)Factory method pattern (Virtual Constructor)
Factory method pattern (Virtual Constructor)
 
Singleton Pattern (Sole Object with Global Access)
Singleton Pattern (Sole Object with Global Access)Singleton Pattern (Sole Object with Global Access)
Singleton Pattern (Sole Object with Global Access)
 

AreWePreparedForIoT

  • 1. The day is not far when virtually all the electronic devices from phone to cars from refrigerators to light switches will be connected to internet and will create a huge network of communication to make our life easier. But are we really prepared for this? Are we prepared for IoT? Rathoud, Sameer
  • 2. If futurists are right, we are going to enter in an era where all the physical objects we interact with on our daily basis, will gather the data through sensors, connect to internet and communicate with each other through the buzzword and sci-fi movie worth concept Internet of Things (IoT). Optimist believes soon these daily usable object will become intelligent and will make our life easy. Tomorrow a refrigerator may suggest you a recipe by looking at the content in it. A light may get dim when you are feeling sleepy. Your shoes may monitor your health and suggest how much calorie you should burn or even may be your shoes will tell, how much calorie your friend has burned. Your dress will monitor your health. Our highways will be safer. Our house will be more efficient. And may be every single idea will become true with IoT tomorrow. With IoT the devices will be connected to various sensors. Through these sensors they collect lot of data, analyze these data and provide suggestion or take some action based on the conclusion of data analysis. But there might be the chances that the data captured by these intelligent devices or data flowing across the internet are highly sensitive and private and by considering privacy and security as stand these devices provide a highly vulnerable point to hackers. Instead of making our life easy as supposed to be by these IoT devices, it can create security havoc. Few years back an incident came in notice, where a malware worm named “Stuxnet”, which was designed to attack industrial programmable logic controller (PLC). PLCs allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material. Exploiting four zero-day flaws, Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software. Stuxnet reportedly compromised Iranian PLCs, collecting information on industrial systems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnet’s design and architecture are not domain-specific and it could be tailored as a
  • 3. platform for attacking modern SCADA and PLC systems. Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges. You can find more information on stuxnet at http://en.wikipedia.org/wiki/Stuxnet. Although this example is not directly portraying the vulnerability of IoT data. But with this example we can imagine how badly a malware can hurt any program. Take another example where an intelligent cooking range is supposed to do some basic pre-processing before I reach home. And a malware in my intelligent device can even influence my house’s fire safety and can burn my house. We can anticipate an attack of the things, when new connected devices cause problems on networks in a variety of ways including increasing network attack surface (every new "thing" is a potential hackable weak point), using up precious bandwidth, generating mountains of sensitive data that needs to be stored and secured, and usable IP addresses as billions of new things connect to networks worldwide. Capturing the data from our intelligent device’s sensors will be ok, until I am not providing the intelligence to the controllers as well or our data security system for these IoT devices should be sound enough that I can rely on the actions of my controller as well. May be tomorrow I will be flooded with suggestions from my IoT devices, but preferably I would like to own the actions rather than these intelligent devices do it for me (at least for now). I don’t want to be very pessimist and we can choose to ignore the impending onslaught of ubiquitous connected devices. While this might be OK for now, we can’t keep our head in the sand for much longer by just thinking of a TRAP!