Updated:

The Internet of Things: Securing Embedded Code Report (Assessment)

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

When thinking about embedded devices and codes, the first association that comes to mind is the automated human spaceship from the animated movie titled WALL-E made by Pixar in 2008. It featured a spaceship where everything, from chair movements to wall panels and food distribution, was governed by a central artificial intelligence (Desilver, 2014). This futuristic representation of the future could not have been made possible without total implementation of embedded codes, which is the central idea behind the Internet of Things – a project that seeks to interconnect all devices and appliances into one web. The movie also demonstrated the inherent dangers of the system, when the AI took full control of it with hostile intentions in mind. The security of embedded hardware and software, especially when it is connected to the World Wide Web via a wired connection or Wi-Fi, raises plenty of questions. While there are certain benefits to the program, the amount of potential downsides, especially in the living sector, is very significant. The purpose of this paper is to review some of the concerns presented in an article dedicated to embedded coding security, titled “The Internet of Things Is Wildly Insecure — And Often Unpatchable,” and provide potential solutions to the problem if there are any.

The Four Main Risks of Embedded Codes and Devices

Bruce Scheiner, the author of the article, identifies four critical problems of the embedded devices and codes currently being used in various home appliances – from routers to refrigerators, home alarms, and other devices. These problems are as follows (Scheiner, 2014):

  • Cheap and standardized hardware promoted only by a few large chip developers and used by many producers in order to cut costs.
  • Outdated programming with plenty of security issues.
  • Lack of support and security updates for embedded devices.
  • Internet of Things will offer a wide field of operation for hackers and malware developers.

The author offers only one solution to fix these problems, and that is to force the vendors to implement updates and upgrades to the software at their own expense. I believe that this solution will not be effective for several reasons. One of these reasons is that implementing updating software to embedded devices will drastically increase the price of the gadgets, meaning they will lose competitive strength. Another reason is that even if the companies provide adequate protection for their devices, it will not be enough. Computer security existed for decades, and still, hackers cause world-wide attacks every year, shutting down banking systems, monetary exchange services, and attacking individual companies and enterprises (Buntz, 2017).

Merkow and Raghaven (2010) largely share Scheiner’s concerns, as in their book they list many weaknesses and assumptions that make the overall system weak to attacks, one of which is the belief that embedded systems are somehow less vulnerable than non-embedded programming software. They also address the wide net of vulnerabilities currently found in Wi-Fi connections and mobile devices, which are seen as mediums for using and controlling various utensils and appliances under the scope of the Internet of Things.

Why is it Dangerous?

We live in a digital age where computers already play a big part of our lives. Hacking a laptop or a computer with private information can already cause significant damage to a person and their property. Internet of Things is offering hackers an even greater operating field by affecting not only computers but many other appliances, with potentially devastating results (Buntz, 2017). Instead of disabling the banking system of a city, a powerful and coordinated hacking attack can disable the entire city altogether, affecting every house and every room. At the same time, Internet of Things presents itself as a cumbersome and ineffective in terms of security, as the net would be too large and expensive to maintain (Buntz, 2017).

Potential Solutions

Sometimes, the best course of action is to do nothing. There is a reason why we still use keys to lock our apartments and power up cars. While they also have certain liabilities and security risks, they require the criminal to remain close, where he or she is vulnerable and can be spotted. The emergence of the Internet of Things and Wi-Fi technology erases that core security requirement – the criminal can now be continents away and still be able to carry out their agenda (Evan, 2013). So, in order to prevent any potential damage caused by embedded devices and vulnerable codes, the producers, and the customers need to reject the concept as a whole. Humanity does not need a Wi-Fi connection to the refrigerator or a report about the temperature in the house accessible via a smartphone. Being able to turn the water heater and the microwave oven on and off with a smartphone application is not necessary either (Bloomberg, 2014). These tasks can be delegated to dedicated devices that cannot be accessed and controlled from a remote location. Alternatively, the arms race between hackers and security networks will continue, with the former always remaining one step ahead, as they have been for more than 20 years now (Scheiner, 2014).

References

Buntz, B. (2017). The 10 biggest IoT security vulnerabilities. Web.

Bloomberg, J. (2014). Web.

Desilver, D. (2014). Web.

Evan, S. (2013). Web.

Merkow, M. S., & Raghavan, L. (2010). Secure and resilient software development. Boca Raton, FL: CRC Press.

Scheiner, B. (2014). Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, December 25). The Internet of Things: Securing Embedded Code. https://ivypanda.com/essays/the-internet-of-things-securing-embedded-code/

Work Cited

"The Internet of Things: Securing Embedded Code." IvyPanda, 25 Dec. 2020, ivypanda.com/essays/the-internet-of-things-securing-embedded-code/.

References

IvyPanda. (2020) 'The Internet of Things: Securing Embedded Code'. 25 December.

References

IvyPanda. 2020. "The Internet of Things: Securing Embedded Code." December 25, 2020. https://ivypanda.com/essays/the-internet-of-things-securing-embedded-code/.

1. IvyPanda. "The Internet of Things: Securing Embedded Code." December 25, 2020. https://ivypanda.com/essays/the-internet-of-things-securing-embedded-code/.


Bibliography


IvyPanda. "The Internet of Things: Securing Embedded Code." December 25, 2020. https://ivypanda.com/essays/the-internet-of-things-securing-embedded-code/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1