0 Results
Your current location: Home > News >Basic Knowledge > Best practice for end-to-end IoT security

Best practice for end-to-end IoT security

Source: eetimes
Category: Basic Know...
eye 50
文章创建人 Iczoom

Original Title:Best practice for end-to-end IoT security

  This white paper explains how mobile connectivity is a central enabler of IoT security. It outlines best practice advice for protection built in at each layer of an IoT solution, and at every stage of its development.

  IoT security can look very complex at first sight

  Most IoT projects today are based on complex ecosystems, involving numerous players and covering a range of use cases, across multiple access technologies.

  Complex ecosystems

  Global IoT deployments typically involve a large number of players, including chipset manufacturers, device makers, systems integrators, software platform providers, enterprise back-end systems, connectivity providers, and more – all with differing infrastructures, profiles, expertise and experience.

  Diverse deployments

  Compliance and common standards across all stakeholders must be strong, and at the same time flexible – because every vertical has its own specific needs and nuances. The security requirements for a smart building, for example, are very different to those of a payment terminal.

  Infinite applications

  Global IoT deals with mass and diversity; it has to scale to accommodate hundreds of thousands of devices and device types with completely different life expectancies, criticalities, storage and processing capabilities.

  As a result of this diverse ecosystem, a unified global security standard and certification for IoT is lacking today, even though there has been progress in certain areas.



  The attack surface of IoT

  Ensuring end-to-end security during the design, build and launch of an IoT project

  Best practice for securing IoT connectivity




  Every IoT layer is prone to different risks. This creates a broad range of threats, from data interception and impersonation, to location tracking, denial-of-service and service frauds. Adoption of basic security measures and protection to reduce the attack surface at each layer can have a huge impact on the overall level of deployment security.

  A complete and comprehensive end-to-end strategy is essential. Adopting a security first mindset during planning, buildout and operation will ensure the greatest impact at the lowest cost.


  Design stage

  Enterprises must adopt a ‘security by design’ approach to identify and address potential threats at the earliest possible stage, when fixes can be implemented most easily. It should encompass devices, connectivity, application platforms and APIs. The later in the process, the higher the cost and difficulty of implementing a fix.

  ‘Security by design’ starts with a risk assessment, reviewing the service architecture and key components to introduce adequate levels of confidentiality/encryption, integrity checks, authentication and accreditation. These parameters can also be used to validate third party compliance during the selection process.

  At this stage, a key connectivity consideration is to segregate data transmission from the internet. Organizations can limit which servers a device can interact with, and define volumes or throughput threshold. They can also control the mobility pattern or profile to be activated for their devices at the network level. Depending on the criticality of the application and data, operational solutions such as a firewall or intrusion detection system should also be considered.


  Diverse Team of Engineers with Laptop and a Tablet Analyse and Discuss How a Futuristic Robotic Arm Works and Moves a Metal Object. They are in a High Tech Research Laboratory with Modern Equipment.

  Build stage

  During the build stage, penetration tests and reverse engineering are essential to validate that the security of the solution is in line with the requirements, and to identify vulnerabilities. Tests must include not only security of data ‘at rest’, but also ‘in transit’ over the network. Penetration testing should be conducted against each layer, as well as on the overall deployment.

  A complete set of best practice guidelines is available from the GSMA to help companies build their IoT deployments with end-to-end security. These reference documents provide a comprehensive set of verifications, checkpoints and considerations to evaluate the security of their projects.

  Launch stage

  The key focus here is maintaining the integrity of the deployment over time by creating and maintaining security in change management and operational processes. Recurrent penetration testing by third parties is useful to validate security after a given period, or to test against new threats.

  For mission-critical deployments, real-time monitoring solutions such as intrusion detection systems can be added, along with firewalls. Automation, big data analytics and machine learning must be used to bring scalability, pattern recognition and profiling capabilities.

  Whether consumer applications or industrial M2M, data security is critical to the long-term success of IoT. Security must be a concern of every player in the value chain, and enforced on the device, network, application and across the three layers at each stage of development.


  Connectivity sits at the center of the technical chain of any IoT project, and so the way in which devices are connected to the IoT application server represents a key security consideration.


  The central position of connectivity is beneficial in two ways:

  It can play a central role in actively securing the end-to-end IoT solution:

  Detecting any abnormal or malicious data getting in or out to/from the device and to/from the application

  Filtering and blocking malicious traffic

  Allowing monitoring and control across device traffic, including IP traffic but also the signaling traffic

  It can be designed to withstand intrusion, protecting the end-to-end solution and ensuring segregation of critical traffic

  End-to-end, connectivity follows a technical chain made up of four steps:

  The radio access for the device

  The transport network to the connectivity platform

  The connectivity platform itself

  Access to the data center where the application is hosted

  To secure connectivity at each step of the technical chain, enterprises must take into consideration the following five guidelines.

  Select the right radio access technology

  Mobile technologies (2G/3G/4G/LTE-M/ NB-IoT) hold a clear advantage for IoT:

  Availability is unmatched by any other radio technologies, as mobile networks are ubiquitous around the world

  A SIM card ensures the highest security in authentication

  Radio encryption of mobile networks has been guaranteeing the integrity of communications for more than 25 years

  Segregate the flow of data from the public internet

  Another essential precaution is segregating the flow of data between the transport network and connectivity platform from the public internet.

  Compared to WiFi networks that always break out to the internet, mobile networks have a strong advantage. In international roaming scenarios, mobile data traffic uses a highly secure infrastructure called GRX/IPX, standardized and governed by the GSMA.

  This means that when a 2G/3G/4G/LTE-M/ NB-IoT device is connected abroad to a visited network, all the data is carried securely on a private network to the connectivity platform.


  Opt for a private IPX to reach the application server

  When accessing the application, best practice for security is to again segregate data flow from the public internet. This can be done by using a private IPX, thus extending the security of traditional GRX/IPX up to the application server.

  Security risks always grow with the number of players involved in connectivity: each interface is an opportunity for external attacks. A consistent policy across the technical chain is a must-have for effective management of these risks.

  Some international carriers act as global MVNOs for IoT, which puts them in a unique position to control the connectivity from the visited country up to the data center of the enterprise. This approach is a strong guarantee of consistent end-to-end management of security.

  For a number of IoT use cases, it is also possible to differentiate the data traffic into two parts: non-critical (such as web surfing) and critical (for example, all device, application, and customer management data). This can be achieved with a connectivity provider that can manage various APNs with different routing management; noncritical data traffic is broken out to the public internet, while critical data traffic is routed over the leased line or private IPX. This allows the enterprise to optimize budget, while ensuring a high level of security for their critical applications.

  Assess security of the mobile core network and resiliency of connectivity

  Over the years, multiple cases of network exploitation have been disclosed where international signaling was used as a means of attack, such as denial-of-service, SMS interception and location tracking.

  To protect their infrastructure and subscribers from these activities, connectivity providers must assess network protection on a regular basis and implement technical solutions, such as signaling firewalls, to proactively detect and block such attacks. They must also ensure full redundancy of their connectivity platform and have a disaster recovery plan in place.

  For international projects, end-to-end connectivity is more complex, and providers must be able to connect devices securely and reliably in all required markets, which usually means:

  Having at least two mobile operator partners in every country

  Being able to reroute data roaming (GRX/ IPX) and roaming signaling through alternative routes if outages occur


  In the System Control Room Technical Operator Stands and Monitors Various Activities Showing on Multiple Displays with Graphics. Administrator Monitors Work of Artificial Intelligence, Big Data Mining, Neural Network, Surveillance Project.

  Deploy a smart connectivity platform

  The role of the connectivity platform is to manage the connectivity of each device across all networks, including the traffic in and out. Intelligence can then be set up inside this connectivity platform to protect devices and the application server, such as:

  Detection of abnormal behavior. The majority of IoT applications follow very clear patterns of use. For example, if a device that is supposed to send a report of 1 MB once per week starts sending more data or more often, this can be an indication of malicious activity.

  Network-based geolocation is the only geolocation technology that cannot be spoofed. The platform can use information that is 100% reliable to determine which base station each device connects to.

  Fraudulent use of SIM cards. If a SIM is removed from the IoT device and placed into a smartphone for personal use, the connectivity platform can detect this and automatically block the SIM card.

  Network firewalls, such as filters on URLs, IP addresses, etc. This will only allow traffic for specific destinations and/or applications.

  Deep packet inspection (DPI). This can be used to detect abnormal content in data flow.


  As the number of deployments soars, IoT security has never been more critical. With every innovation comes the opportunity for a more sophisticated means of capitalizing on its weakness. At the heart of each IoT deployment, connectivity plays a central role in protection. Here, mobile technologies offer unique advantages.

  The mobile industry is also constantly creating standards for connectivity with a strong focus on security, thus significantly increasing the protection of mobile subscribers and connected devices. 5G standards and specifications perfectly illustrate the trajectory of security by design, integrating enhanced and reinforced radio encryption, authentication and integrity, alongside mechanisms specifically designed for IoT.

  When selecting a global mobile connectivity provider, enterprises must look carefully into three main aspects:

  Intelligence of their connectivity platform to detect abnormal behaviors and act against potential security risks.

  Quality and reach of their global IPX infrastructure so that all solutions, from their devices up to their application, remain securely connected regardless of location.

  Design of their solution to ensure protection from external attacks, such as through international signaling.

  By working with mobile operators or mobile virtual network enablers, enterprises can leverage a global, robust and secure infrastructure already in place, complete with ever improving industry standard security processes and best practice at every stage of connectivity. Enterprises must also consider tapping into the security and reliability of IPX networks that the mobile community has been able to deploy globally for the past two decades.


1.The content, data, charts, etc. of this article come from network reference or other public materials, and the copyright belongs to the original author and the original published source. If the copyright owner has any objection to the quotation of this article, please contact ICZOOM "marketing(at)iczoom.com" and we will deal with it in a timely manner.

2.The quotes in this article are for readers' learning exchange only, and do not involve commercial purposes.

3.The content of this paper only represents the author's point of view. ICZOOM cannot gurarante and assure the accuracy, reliability or integrity of the content. The decision or behavior made by readers after reading this article is based on their own will and independent judgment. Please clarify the relevant results before reading this article.

4.Please contact ICZOOM "marketing(at)iczoom.com" with the reason of reproducing if you want to reproduce the articles that ICZOOM owns the copyright. Without permission to reproduce, ICZOOM will reserve the right to pursue the legal liability.

5. If there is any inconsistency between the English and Chinese versions, the Chinese version shall prevail.

ICZOOM has the final right to interpret this statement.

keywords: IoT

Related Information

Recommended News
Use High-Current IGBT Drivers with Built-In Protection for Reliable Industrial Motor Control

Use High-Current IGBT Drivers with Built-In Protection for Reliable Industrial Motor Control

How to Solve Analog High Voltage Delivery Challenges with a Bootstrap Approach

How to Solve Analog High Voltage Delivery Challenges with a Bootstrap Approach

How and What the ICZOOM would do

How and What the ICZOOM would do

How to Reduce Power Consumption in Always-On Voice Interface Designs

How to Reduce Power Consumption in Always-On Voice Interface Designs

Are the Major DRAM Suppliers Stunting DRAM Demand?

Are the Major DRAM Suppliers Stunting DRAM Demand?

Automotive power semiconductors growth accelerating

Automotive power semiconductors growth accelerating

Recommended Selling