Multi-Factor Authentication Is Crucial for IoT Security

2023-02-21 07:46:04
关注

Multi-Factor Authentication Is Crucial for IoT Security
Illustration: © IoT For All

The billions of IoT (Internet of Things) devices that connect the world are streamlining everyday life. Health care, smart homes, and manufacturing firms are just some of the industries that benefit from the data collection and automation that IoT can provide. However, the more devices, the more chances hackers take to tamper with and steal sensitive data. That’s where multi-factor authentication in IoT comes in.

IoT devices are often connected to each other and, in turn, to the internet. If a hacker gains access to an unsecured IoT device, they could alter functionality for a whole host of devices. Hardware, software, and connectivity all need adequate security to protect devices and data from unauthorized forces.

“If a hacker gains access to an unsecured IoT device, they could alter functionality for a whole host of devices.”

-Zac Amos

In fact, a 2017 ransomware attack on Britain’s National Health Service affected IoT devices like MRI scanners, equipment, and computers, all placing patients at risk. Clearly, IoT security is critical for protecting data and lives across the world.

One way to achieve a fortified IoT connection is through multi-factor authentication (MFA), which requires various pieces of evidence to allow access to a device or network. This method is crucial for the future of IoT, whether it be in smart fridges or health monitoring devices.

Why Is Multi-Factor Authentication in IoT So Crucial? 

Most passwords are either weak enough to be hacked or too complex to remember. With single-factor authentication, brute force attacks can knock these flimsy passwords out in seconds.

Many IoT devices are also more minimalistic than the typical smartphone, laptop, or tablet, so users cannot log onto these interfaces directly. Verification is key, as security depends on administrative actions to log on.

However, MFA is better at validating identity with specific evidence. Today, many banks, social media platforms, and health organizations require two-factor authentication (2FA) in the form of SMS codes and one-time passwords sent to the user’s phone. MFA works similarly but requires more than two pieces of evidence to authenticate. This is ideal for businesses or any organization that handles sensitive information.

MFA will gather evidence in four key areas to verify the identity of the user:

  • Knowledge that only the user would know, such as a password or pre-selected security question. For example, they may ask, “What was the name of your childhood pet?”
  • Possession of unique ownership like a key fob or card
  • Inherent biometric characteristics like fingerprints or retinal scan
  • Location and time of log on

With all these verification forms, it is much harder for hackers to succeed. Multi-factor authentication is known to protect against phishing, social engineering, key logging, and brute force attacks.

Tips for Implementing Multi-Factor Authentication in IoT 

Though it’s clear that multi-factor authentication is critical to eliminating cyberattacks and building better security measures, only 57% of surveyed businesses used MFA to protect their devices. Implementing MFA is the best way to protect data and ward off cyberattacks, so companies can use these tried and tested methods for using MFA.

1. Incorporate Across the Board

Once multi-factor authentication is implemented into the IoT system, it’s best to incorporate it everywhere. IoT is often connected through the internet and similar networks, so don’t stop at securing heavy-duty and sensitive systems. Devices that aid in temperature control are just as important as heart monitors or electrical towers. If a hacker gains access to one, they may be able to travel to others on the network.

Extend the multi-factor upgrade beyond IoT as well. Google and PayPal are some of the big businesses incorporating MFA into payment services. This level of protection is ideal for everyday people and businesses alike to safeguard their finances and communications.

2. Try Auto-Generated SMS Codes

SMS codes are convenient and more secure than authentication emails. They require the user to have access to another trusted device like their smartphone, as well as the IoT device itself. It’s also a timely method. Codes are generated and sent to the trusted device within minutes so users can keep everyday routines on schedule. SMS-generated codes are one of the most popular methods of possession authentication and check all the boxes on simplicity and security.

3. Explore Biometric Scanning

Biometric scanning is a fascinating way for high-security businesses to verify a user down to their inherent biological traits. Behavioral biometrics analyze a person’s movements, such as keystrokes, gestures, and tone of voice. Physiological biometrics examine facial structure, fingerprints, and retinas. With cameras attached to IoT devices or at key checkpoints, these systems can verify multiple biological factors on a person without waiting for codes, scanning a card, or inputting a password. 

While compelling and streamlined, biometric scans are expensive and better suited for highly sensitive operations. 

4. Provide Employee Education

Educating employees on the power of MFA is vital to fortifying IoT security. If they need clarification on methods, updates, or the importance of safety, they could make lapses in judgment or accidentally leave room for security breaches.

Make sure there is an alert system enabled for employees as well. If one of their credentials is used without their knowledge, an automated alert can notify them and the proper security teams immediately. Placing security in their hands gives them greater responsibility and purpose for their MFA actions.

5. Keep it Straightforward

Ultimately, integrating MFA into IoT should be as streamlined as possible. Many organizations use various IoT-connected devices, so marking down codes and passwords hundreds of times a day is not conducive to a proper workday. To ease this burden, employers can require MFA apps like Google Authenticator.

MFA for the Future

IoT connects the world in a multitude of ways, so protecting its integrity is critical to the success of any organization or user. In an instant, a hacker could gain access and tamper with operations and data. But with the discerning power of multi-factor authentication in IoT, people can feel more confident in the security of their IoT devices far into the future.

Tweet

Share

Share

Email

  • Cybersecurity
  • IT and Security
  • Security

  • Cybersecurity
  • IT and Security
  • Security

参考译文
多因素身份验证对物联网安全至关重要
插图:© IoT For All 将世界连接在一起的数十亿物联网(IoT)设备,正在简化日常生活。医疗保健、智能家居和制造业只是受益于物联网所提供的数据收集和自动化技术的几个行业。然而,设备越多,黑客就越有机会篡改和窃取敏感数据。这时候,物联网中的多重身份验证就派上用场了。物联网设备通常彼此相连,并进一步连接到互联网。如果黑客入侵了某个未受保护的物联网设备,他们可能会影响整个设备网络的功能。硬件、软件和连接都需要足够的安全保障,以保护设备和数据免受未经授权的侵入。 “如果黑客入侵了一个未受保护的物联网设备,他们可能会影响整个设备网络的功能。” — Zac Amos 事实上,2017年英国国家医疗服务体系遭受的勒索软件攻击影响了MRI扫描仪、设备和电脑,所有这一切都将患者置于风险之中。显然,物联网安全对于保护全球的数据和生命至关重要。 实现更安全的物联网连接的一种方式是使用多重身份验证(MFA),它要求提供多条证据以允许访问设备或网络。这一方法对于物联网的未来发展至关重要,无论是智能冰箱还是健康监测设备。 为什么物联网中的多重身份验证如此关键? 大多数密码要么太弱,容易被破解,要么太复杂难以记忆。使用单因素身份验证时,暴力攻击可以在几秒钟内破解这些脆弱的密码。许多物联网设备也比典型的智能手机、笔记本电脑或平板电脑更简约,因此用户无法直接登录这些接口。验证是关键,因为安全依赖于管理员的操作登录。然而,MFA则通过特定的证据更好验证身份。 如今,许多银行、社交媒体平台和医疗机构要求用户通过短信验证码和一次性密码进行双因素验证(2FA)。MFA的工作方式类似,但需要提供多于两个证据来进行身份验证。这对于企业或处理敏感信息的任何组织来说都是理想的选择。 MFA将在四个关键领域收集证据以验证用户身份: 1. **知识**:只有用户才知道的信息,例如密码或预设的安全问题。例如,系统可能会问,“你童年时宠物的名字是什么?” 2. **拥有权**:用户独有的物品,比如密钥或卡片。 3. **生物特征**:如指纹或视网膜扫描等固有的生物特征。 4. **登录位置和时间**:用户登录时的地点和时间。 有了这些验证方式,黑客更难成功入侵。多重身份验证已被证明可以防范钓鱼攻击、社会工程学攻击、键盘记录和暴力破解等攻击。 物联网中实施多重身份验证的技巧 虽然很明显多重身份验证对于消除网络攻击和建立更好的安全措施至关重要,但调查显示只有57%的企业使用MFA来保护其设备。实施MFA是保护数据和防范网络攻击的最佳方式,因此企业可以采用这些已被验证的有效方法: 1. **全面应用** 一旦在物联网系统中实施多重身份验证,最好将其全面推广。物联网通常通过互联网及类似网络连接,因此不应只保护那些关键和敏感系统。温度控制设备与心率监测器或电力塔一样重要。如果黑客入侵了其中一个,他们可能通过网络访问其他设备。 此外,还应将多重身份验证的升级扩展到物联网之外。谷歌和PayPal等大型公司正在将MFA整合到支付服务中。这种安全级别既适合普通人,也适合企业,以保护他们的财务和通讯。 2. **尝试使用自动发送的短信验证码** 短信验证码方便又安全,比验证邮件更优。它们要求用户拥有另一个可信设备,如智能手机,同时还需要拥有物联网设备本身。这还是一种时效性强的方法。验证码在几分钟内生成并发送到可信设备,让用户可以继续日常流程。短信验证码是拥有权验证中最为流行的方法之一,兼顾了便捷性和安全性。 3. **探索生物识别扫描** 对于高安全需求的企业,生物识别扫描是一种引人注目的验证方式,它能够根据用户的生物特征进行身份识别。行为生物识别分析用户的行为,如键盘敲击方式、手势和语音语调。生理生物识别则检查面部结构、指纹和视网膜。通过连接到物联网设备或关键检查点的摄像头,这些系统可以在不等待验证码、扫描卡或输入密码的情况下验证多个生物特征。 尽管生物识别扫描具有吸引力且流程顺畅,但它成本较高,更适合高敏感性操作。 4. **提供员工培训** 对员工进行MFA重要性的教育,是加强物联网安全的关键。如果他们对方法、更新或安全的重要性存在疑问,就可能导致判断失误或无意中留下安全漏洞。确保为员工启用警报系统也很重要。如果他们的凭证在未经授权的情况下被使用,自动化警报可以立即通知他们及相关的安全部门。 将安全责任交到他们手中,使他们对MFA操作承担更多责任和意义。 5. **保持简单明了** 最后,将MFA集成到物联网中应尽可能简洁。许多组织使用各种连接物联网的设备,因此每天反复记录数百个验证码和密码不利于正常工作。为了减轻负担,雇主可以要求使用MFA应用程序,如Google Authenticator。 **面向未来的MFA** 物联网通过多种方式将世界连接在一起,因此保护其完整性对于任何组织或用户来说都是成功的关键。在一瞬间,黑客就可能获得访问权限并篡改操作和数据。但借助物联网中多重身份验证的精准识别能力,人们可以对未来物联网设备的安全性更加放心。 Tweet | 分享 | 邮件 网络安全 | IT与安全 | 安全
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘