Innovating Healthcare Device Management with IoT-Enabled Real-Time Lifecycle Monitoring
SOURCE: ANALYTICSINSIGHT.NET
MAR 22, 2025
Zero Trust Data Is Key To Unlocking IoT’s Potential
SOURCE: AFCEA.ORG
FEB 01, 2025
IoT will revolutionize smart city, energy, manufacturing and transportation systems by providing the real-time situational awareness information necessary for artificial intelligence (AI)/machine learning (ML)-driven control systems to better assist with mission operations. However, with the advantages of IoT-based smart infrastructure comes increased cybersecurity risks, from unauthorized surveillance to data tampering to hijacking management systems. Protecting data generated by an IoT system must be integral to the design of the IoT system. False situational awareness information can seriously impact threat assessment and response for IoT-monitored bases and battlefields. Large-scale IoT systems are complicated to protect, as the need for standards for provisioning virtual private network connections for a smart city or mobile smart transportation system makes protecting IoT systems more complicated. Fortunately, zero trust data (ZTD) provides a more elegant data protection solution for large IoT and small-scale deployments. This zero-trust IoT data protection is essential in protecting critical infrastructure and military systems.
In smart city operations, the use of IoT solutions is becoming prevalent in protecting critical civilian utility infrastructure. Recent intel on Chinese hacking activities has identified civilian utility infrastructures as primary targets for disrupting military actions protecting our national interests. Furthermore, advances in automation to operate these civilian utility infrastructures make them less likely to have rapid human issue detection and more likely to depend on IoT solutions to play initial notification and first automated response roles.
IoT systems, networks of interconnected devices, sensors and software enabling them to connect, collect and exchange data over internet protocol (IP)-based networks, can be expansive (simultaneously monitoring a large land area) or mobile solutions (e.g., drones that monitor a small, focused area). This network of interconnected devices amasses large volumes of data that must be rapidly processed and made available to human operators. Mobile IoT solutions are often remotely monitored, controlled and automated. This automation increases efficiency, convenience and safety. However, battlefield reliance on these remote solutions makes them prime targets for network attacks, and their compromise can degrade situational awareness enough to hamper mission effectiveness.
Another security challenge is rooted in the purpose of the U.S. Department of Defense (DoD) IP network connectivity. This may seem like common sense, but it must be stated. The simplified goal of a DoD network is to move data securely and rapidly. In an automated environment, sensors generate data aggregated and analyzed by AI/ML at the edge, in data centers or the cloud. Regardless of the location of the analysis, the data will spend time at rest, in transit, and will likely traverse multiple IP networks. Since IoT solutions are increasingly used as initial notification and first response components of a battle management scenario, ensuring IoT data is not accessed or tampered with is highly mission critical.
Network and data management automation, which automatically collects, processes, aggregates and manages huge volumes of data with accuracy and speed that would be impossible for human operators, involves AI algorithms and ML software to aggregate and accelerate data handling throughout its life cycle. Data’s value exponentially increases when it can be aggregated and condensed to human consumable form, trusted and shared with others to create new insights. Usability, trust and data portability are core enablers to extract value from IoT-rich environments (e.g., monitoring activity with the battlefield theater).
Zero Trust Data Design Concepts
ZTD is a new security architecture where every data object (e.g., data from every sensor) is encrypted using a different key. More importantly, access to the keys is controlled by a policy server. Some of the essential design concepts include:
Zero Trust Data Benefits to IoT
Let’s apply ZTD to automating critical infrastructure, where information (extracted from aggregated and analyzed data) has become the new currency, and trust and protection are table stakes. ZTD is a change in how organizations think about cybersecurity by recognizing that protecting the data enables more capabilities than just protecting the network. Remember that usable, trusted and portable data increases data value. ZTD complements traditional zero-trust architectures, focusing on the network architecture and applying the “never trust, always verify” principle at the data packet level. ZTD applies encryption to each assigned data packet. ZTD leverages the concept of microsegmentation (applied to each data object), granting access privileges based on user credentials, like device ID, location and other contextual information, to authorize access to each data object (e.g., sensor). This technique requires the intruder to decrypt each data object in a data stream to make sense of the information, which is complex and highly unlikely.
Some of the benefits of using ZTD for IoT include:
Conclusion
We are beginning the path of unprecedented economic growth in IoT solutions due to the introduction of IoT in military and civilian smart city, energy, manufacturing and transportation arenas. It’s no longer sufficient to protect just the networks; we must protect the data and make it intelligent. ZTD offers a proactive and holistic approach to cybersecurity, empowering organizations to protect their data and apply policies and logging capabilities to control and leverage the value of their data assets. By embracing the principles of ZTD, organizations can build a robust security posture that protects against existing vulnerabilities while improving the efficiency and business model of smart systems.
Randolph Clark is a member of AFCEA International’s Technology Committee. He is a wireless communication consultant and board adviser for several critical infrastructure emerging technology companies. Clark has more than 30 years of wireless experience, from serving as a Marine Corps communicator to business development for mobile network operators and advisory roles at USD (R&E) & HQ AF/A4. Clark’s strategic insights are valued for their practical approach to mission achievement.
Junaid Islam is also a member of AFCEA International’s Technology Committee. He has 35 years of experience in secure communications and has developed network protocols that have been adopted by the Department of Defense. Islam made major contributions to MLPP buffer management for weapons systems, MPLS priority queuing for global communications, Mobile IPv6 for netcentric warfare and is the inventor of Software Defined Perimeter, used as a zero-trust network access solution by the U.S. intelligence community. Currently, Islam is focused on zero-trust data solutions and supports NASA’s Interference Aware Routing program.
LATEST NEWS
WHAT'S TRENDING
Data Science
5 Imaginative Data Science Projects That Can Make Your Portfolio Stand Out
OCT 05, 2022
SOURCE: ANALYTICSINSIGHT.NET
MAR 22, 2025
SOURCE: BUSINESSDAY.NG
MAR 22, 2025
SOURCE: NEWSELECTRONICS.CO.UK
MAR 14, 2025
SOURCE: THECSRJOURNAL.IN
MAR 01, 2025
SOURCE: ANALYTICSINSIGHT.NET
MAR 01, 2025