Skip to main content
LTTS

LTTS

Quick Links mini

  • Search
  • info@LTTS.com
  • English
  • 日本語
  • Israel
  • German
  • Contact
  • Engineering the change
  • Industry
    • Communication
    • Media & Entertainment
    • Semiconductors
    • Consumer Electronics
      • Consumer IoT
      • Enterprise Devices
      • Personal Devices
    • Oil & Gas
      • Digitalization
      • Oilfield Services
      • Owners and Operators
    • Software & Platforms
    • Healthcare
      • Medical Device & Life Sciences
      • Pharma & CRO
      • Healthcare Providers
    • Plant Engineering
      • FMCG
      • Chemicals
      • Discrete Manufacturing
      • Metals & Mines
    • Transportation
      • Aerospace Engineering
      • Automotive
      • Rail Transportation
      • Travel & Hospitality
      • Trucks & Off-Highway Vehicles
    • Industrial Products
      • Building Technology & Smart Infrastructure
      • Electrical, Instrumentation and Controls
      • Power & Utilities
    • Public Infrastructure & Smart Cities
  • Services
    • Digital
      Engineering & Consulting
      • Cybersecure
        • Security Monitoring
        • Security Services
        • Security Solutions
      • Immersive Experiences
      • Industry 4.0
      • Product Consulting
      • Sustainability Engineering
      • Sustainable Smart World
      • 5G
    • Product
      Engineering
      • Digital Engineering
        • Cloud Engineering
        • DevOps
        • Immersive Experiences
        • User Experience
      • Embedded Engineering
        • Embedded Systems
        • Sustenance
        • VLSI
        • Wearables Engineering
      • Mechanical Design
        • CAE & CFD
        • CAx Automation
      • Software Engineering
        • Engineering Analytics
        • Sustenance & Maintenance
        • User Experience Design
        • Voice Innovations
      • Testing & Validation
        • Integrated Design, Validation & Testing
        • Lab as a Service
        • Testing
    • Manufacturing
      Engineering
      • Smart Manufacturing
        • Accelerated Operations
        • Digital Factory & Simulations
        • Plant Design & Engineering
      • Manufacturing & Planning
        • Accelerated Operations
        • Digital Factory & Simulations
        • Line Expansion & Transfer
        • Manufacturing Automation
        • New Product Development
        • Plant Design & Engineering
        • PLM on Cloud
      • Manufacturing Execution
        • Agile Supply Chain
        • Content Engineering
        • Material & Parts Management
        • Sourcing & Procurement
    • Operations
      Engineering
      • Connected Product Support
        • DevOps
      • Supply Chain Engineering
        • Sourcing & Procurement
      • Plant Engineering
        • CAPEX Project E/EPCM Services
        • Operational Excellence
        • Plant Sustenance & Management
        • Material & Parts Management
        • Regulatory Compliance Engineering
  • Solutions
    • AiCEArtificial Intelligence Clinical Evaluation
    • AiKno™ Machine Learning, NLP & Vision Computing
    • AnnotAiAI Based Data Annotation Tool
    • ARC Asset Reliability Centre
    • Avertle®AI Predictive Maintenance Solution
    • CHEST-rAi™ AI Chest X-Ray Radiology Assist Suite
    • Cogmation Device Test Automation Framework
    • Connected Security Integrative Zero Trust Architecture
    • ESM Energy and Sustainability Manager
    • FlyBoard®Advanced Digital Signage Solution
    • i-BEMSIntelligent Building Experience Management
    • nBOnnB-IoT Protocol Stack
    • Fusion Pre-integrated City Operating System
    • Semiconductor IP For Security, Communication & Verification
    • UBIQWeise 2.0 Device to Cloud IoT Platform
  • Insights
    • Blogs
      • Embedding Innovation in Semiconductors with Platform Software and Middleware
      • Towards a Connected, Collaborative, & Intuitive Tomorrow: Redefining the Future with a Blink
      • 6 DevOps Trends to Watch Out for in 2023
    • News
      • L&T Technology Services unveils CoE to offer suite of automotive solutions on AWS
      • LTTS Selected as Strategic Engineering Partner to Airbus for Advanced Capabilities and Digital Manufacturing Services
      • LTTS agrees to acquire Smart World & Communication business of L&T
    • POV
      • Hidden Correlations Shaping the Future of European Enterprises
      • From the Super Bowl to 5G
      • Vehicle-to-Everything (V2X) Enabling Smarter, Safer, and Greener Transportation
      • Will 5G Technologies Drive a New Future for Media & Entertainment?
    • eBooks
      • The Art of Cyberwar
      • Digital Twin - The Future of Manufacturing
      • Digitalising Wind Energy Ecosystem
      • INDUSTRY 4.0: The Future Is Now
      • Digital Engineering Explained
      • Sustainability Engineering
  • Explore LTTS
    • About Us
    • Accolades
    • Alliances
    • Analysts
    • Board of Directors
    • Careers
    • CSR
    • Events & Webinars
    • Investors
    • Media Kit
    • Nearshore Centers
    • News & Media
    • Quality Management
    • Resources
    • Sustainability
    • Testimonials
  • Contact
 

Cyber security

Bolstering Connected Home Network Security

  1. Home
  2. Blogs
  3. Industry
  4. Bolstering Connected Home Network Security

Bolstering Connected Home Network Security

Bolstering Connected Home Network Security
Published on: 17 Jul, 2019
311 Views
0 comments
Share This Article:
  • Twitter
  • Facebook
  • Linked in
Intelligent Homes
Smart Homes
Cybersecurity
Cybersecurity Best Practices

The Future is ‘Connected’, but is the Network Safe?

The advent of smart connected devices has transformed the quality of living. Over the past few years, the world has witnessed the emergence of groundbreaking connected home technologies like smart lighting, smart thermostats, and sophisticated security cameras. Connectivity has helped the community advance towards smart future homes that are intuitive to our needs, while being ecologically friendly, cost-effective and physically safer.

The proliferation of smart connected devices within the home network however, comes with its own set of risks. As a home network grows by integrating varied connected devices and systems within its ecosystem, the chances of security breaches increase manifold.

A recent research conducted by a cybersecurity major reveals that hackers can gain access to a smart home through misconfigured Message Queuing Telemetry Transport (MQTT) servers. The study found that more than 49000 MQTT servers were publicly accessible on the internet because of a protocol that was misconfigured, leaving a whopping 32000 serves with absolutely no password protocol in place.

This is just one of the several hundred ways through which cybercriminals can access a home network and exploit highly confidential data for ransom. In a recent quarterly report published by a leading cybersecurity solutions provider, the company has warned users about the advent of an Android-based malware known as TimpDoor, which was discovered a year ago. Because a number of connected home devices are controlled by smartphones, malware such as TimpDoor can help hackers trick users into letting them inside their homes.

Proliferation of such malware make millions of connected devices such as DVRs and IP cameras extremely vulnerable. Malware coders can exploit a list of default passwords to develop and deploy botnets as a distributed-denial-of-service (DDoS) weapon on a specific network. The results of such attacks can be scathing. Imagine a hacker illegally accessing a baby monitor and broadcasting threat messages or home security camera footage being sent to the wrong person – no matter how unbelievable this may sound, such incidents have occurred in the recent past. 

Yet, there’s a general lack of awareness among the mass regarding network vulnerabilities and its potential impacts. For instance, research reveals that almost 15% of IoT device owners do not change the default password that comes with the product. From a device manufacturer’s standpoint as well, there are similar apprehensions. The home IoT market is quite large, but not all manufacturers invest in security.

Recently, a renowned cybersecurity research firm published an article highlighting a massive security hole in the database of a China-based manufacturer of smart security devices. According to reports, the company’s database containing consumer profiles is open and unprotected, which means that anyone who can breach this information can access anything from IP addresses, passwords, and user location.

Building Secure Smart Homes of Tomorrow  

Despite the perils, the future spells exciting new possibilities for the connected home technology – and the opportunities unfolded by the Internet of Things (IoT) and connected devices are only going to get bigger and better going forward. While it’s good to let these devices ease our lifestyle, what’s important is to ensure complete protection of home networks without compromising on the perks of high-tech innovation. 

There are several layers of security measures that define a safe connected home environment. According to research firm Gartner, the following are the four main principles of securing a connected home:

  • Prevention: Users can prevent a malicious botnet or a security hack through device hardening. Other effective prevention mechanisms include network segmentation or separation to keep guest devices on a separate secure network.
  • Detection: Network traffic monitoring at regular intervals can help users detect a hack or an infected device within a network. The majority of the specialized hardware/software security vendors offers targeted solutions that can help detect anomalies within a given network.
  • Response: After detecting a network intrusion attempt, vendors analyze the incident and come up with new security models in response.
  • Prediction: Network security experts train threat models with real-world network traffic data to identify potential threat vectors.

From a user standpoint, securing a connected home network begins with protecting the router which serves as the main connection between the outer network and connected gadgets. Users need to reset any default password and update the same at regular intervals as it helps in resetting the router’s security protocol.

Network segmentation is another way through which users can safeguard their smart home network from security breaches. Today, a particular home network ecosystem supports several types of devices and applications including smartphones, hypervisors, mobile applications, smart speakers, security cameras, web browsers, and home computers. Modern enterprise networks expand even further and comprise of endpoints, cloud servers, data centers and so on.

As adoption of IoT evolves across both connected home and enterprise space, network administrators need to consider how the resources on a specific network can be separated to limit malicious communications with external entities. A well-planned network segmentation approach can allow network administrators to implement policies that grant network access to only designated users.

The fight against cybersecurity breaches in a connected home environment is incomplete without a robust security software application embedded in every controller device. Network administrators need to regularly update and install the firmware upgrades in network components to stay safe from new threats. Also, in order to ensure holistic security of the home network, they can consider implementing an end-to-end user, device and resource management solution. An excellent example of such a solution is IronHomeTM which is a cloud-based smart home security offering which provides multi-layered security, alerting customers of potential vulnerabilities in their homes, while simultaneously allowing network administrators to identify abnormal traffic activity, block phishing attempts and upgrade package. 

Rounding Up

For people, connected device manufacturers and network administrators who are fast embracing technology transitions such as IoT and mobility, now is the time to rethink and transform existing network frameworks that been there for ages. There’s technology out there that can be leveraged in order to maintain a strong security posture in front of new and evolving threats.

After all, attackers will not discriminate. Their motives will diversify and their persistence will increase as they start understanding new technology and its applications. To capitalize on the huge opportunities that IoT and connected home represent, we must all take collective steps towards safeguarding the newfound possibilities from those who threaten to exploit the diversity and growth of the modern network.   

Authors

Yaron Pass
Yaron Pass
Head - Engineering and Security CoE

Related Blogs

Prafulla Bhoyar
Intelligent Homes: A Revolution in Domestic Life
09 Jun, 2017
Vinay Bhanot
Building Cyber Defenses For Smart Plants
10 Nov, 2017
L&T Technology Services
Transforming Digital Health Ecosystems — Challenges Toward Ensuring Security, Privacy, and Trust
14 Feb, 2023
Leave a Comment
About text formats

Comments

No Comments

×Explore
  • Industry
  • Spotlight
  • ×
  • Automotive
  • Consumer Electronics
  • Industrial Engineering
  • Lighting & Building Solutions
  • Media & Entertainment
  • Medical Devices
  • Oil & Gas
  • Plant Engineering
  • Power Electronics
  • Renewable Energy
  • Semiconductors
  • Industrial Products
  • Transportation
  • Telecommunications
  • 5G
  • Cloud engineering
  • Cyber security
  • Embedded systems
  • Industry 4.0
  • Smart Manufacturing
  • Smart Products
  • VLSI
  • Sustainability
  • Artificial Intelligence
  • AR/VR
  • Image Processing
  • Connected Healthcare
  • Smart Factory
  • Digital Twins
  • Building Automation
  • Autonomous Transport
  • Robotics
  • Digital Entertainment
  • Machine Learning
  • UI/UX
  • Manufacturing Automation
  • Smart Sourcing
  • Simulation
  • Software Defined Networking
  • Telehealth
  • Wearables
  • Design Thinking
  • IoT Security
  • ER&D Hackathon 2019
  • Digital Media
  • The New Normal
  • Data Mesh
  • DevOps
  • Media
  • parent-company-logo.png
  • Need Help
  • Contact Us
  •  

Contact Us

By clicking Submit, you agree to the Privacy Policy

  • Engineering the change
  • Industry
    • Communication
    • Consumer Electronics
    • Healthcare
    • Industrial Products
    • Media & Entertainment
    • Oil & Gas
    • Plant Engineering
    • Public Infrastructure & Smart Cities
    • Semiconductors
    • Software Products
    • Transportation
  • Services
    • Digital
      • Cybersecure
      • Security Monitoring
      • Security Solutions
      • Security Services
      • Immersive Experiences
      • Industry 4.0
      • Product Consulting
      • Sustainable Smart World
      • Sustainability Engineering
      • 5G
    • Products
      • CAE & CFD
      • CAx Automation
      • Cloud Engineering
      • DevOps
      • Embedded Systems
      • Engineering Analytics
      • Integrated Design, Validation & Testing
      • Lab as a Service
      • Sustenance
      • Testing
      • Testing & Validation
      • User Experience
      • VLSI
      • Voice Innovations
      • Wearables Engineering
    • Manufacturing
      • Accelerated Operations
      • Agile Supply Chain
      • Content Engineering
      • Digital Factory & Simulations
      • Line Expansion & Transfer
      • Manufacturing Automation
      • New Product Development
      • Plant Design & Engineering
      • PLM on Cloud
      • Sourcing & Procurement
    • Operations
      • CAPEX Project E/EPCM Services
      • DevOps
      • Material & Parts Management
      • Operational Excellence
      • Plant Sustenance & Management
      • Regulatory Compliance Engineering
      • Sourcing & Procurement
  • Solutions
    • AiCE
    • AiKno™
    • AnnotAi
    • ARC
    • Avertle®
    • Chest-rAi™
    • Cogmation
    • Connected Security
    • ESM
    • FlyBoard®
    • i-BEMS
    • nBOn
    • Fusion
    • Semiconductor IP
    • UBIQWeise 2.0
  • Insights
    • Blogs
    • News
    • POV
    • eBooks
  • Explore LTTS
    • About Us
    • Accolades
    • Alliances
    • Analysts
    • Board of Directors
    • Careers
    • CSR
    • Events & Webinars
    • Investors
    • Media Kit
    • Nearshore Centers
    • News & Media
    • Quality Management
    • Resources
    • Sustainability
    • Testimonials
  •  
  •  
  •  
  •  
  •  
^
  •  
  •  
  •  
  •  
  •  

© 2023 L&T Technology Services Limited. All Rights Reserved.

  • COPYRIGHT & TERMS
  • PRIVACY
  • Site Map
  • info@LTTS.com