Page 18 - IO_magazine
P. 18

Research





          MANAGING THE






         UNMANAGEABLE









          By 2030, there will be about three hundred          The researchers launch attacks on Internet-of-Things devices
                                                              themselves in a test setting to see where the vulnerabilities
          billion devices connecting to the internet          are and how attackers can take advantage of them. In addi-
          worldwide. How do you secure such a network         tion, they study the subject from a criminological point of
                                                              view: What priorities does an attacker set? And to what
          of systems? In the eight-year INTERSECT pro -       end? They also investigate how attacks can be prevented
          gramme, researchers from various disciplines        or repelled. What vulnerabilities should definitely be fixed
                                                              because they are of interest to attackers? And which are less
          are formulating guidelines for the design,          important? Etalle: ‘Every system is full of vulnerabilities, but
                                                              you don’t have to fix all of them. We focus on the vulnerabili-
          management and maintenance of smart                 ties that can be and actually are exploited.'
          connected applications such as coffee
                                                                A LOT OF INTEREST
          makers, street lighting, and body sensors.
                                                              This subject is clearly relevant to civil society organisations,
          By Sonja Knols                                      companies and universities, says Etalle. ‘This is the first
                                                              major multidisciplinary project in the field of cybersecurity,
         ‘The Internet-of-Things offers possibilities that greatly exceed   and a lot of companies immediately expressed their interest
          the computer systems we know today,’ says programme leader   in committing to it. INTERSECT is about how to secure
          Sandro Etalle from Eindhoven University of Technology. ‘But   something that is inherently unmanageable. That is a great
          the impact of an Internet-of-Things systems hack can be huge.   challenge we will firmly dig in to over the coming years.’
          Take the example of smart houses: instead of arriving with a
          screwdriver or glass cutter, burglars can now open your front
          door remotely through a targeted hacking attack.’ In addition,
          IoT-devices themselves can be used to perform Distributed      INTERSECT: AN INTERNET
          Denial of Service (DDoS) attacks, such as the 2016 attack on
          DNS provider Dyn by hundreds of thousands of infected   OF SECURE THINGS
          devices like digital video recorders and IP cameras.
                                                                The INTERSECT project is funded by the first round
            SPACE, TIME AND STRUCTURE                           of the Dutch Research Agenda – Research along
                                                                routes by Consortia (NWA-ORC) programme.
          Within the INTERSECT programme, more than 45 affiliated
          partners examine both the design and security as well as the   Size: 8.2 million euros, 35 FTE
          management of Internet-of-Things systems. The researchers   Duration: 01/11/2019 to 31/10/2027
          focus not just on technical questions, but explicitly on the    Consortium: more than 45 participants from
          relevant governance, criminological and legal aspects too.    universities, companies, NGOs and government,
          Three research dimensions have been defined within     led by Eindhoven University of Technology
          the programme, focussing on space, time and structure.
          Questions that are tackled vary from ‘How do you patch a
          myriad of completely different devices all over the world,
          even in places where there is little access?’ to ‘How can we
          make sure necessary software updates are provided for
          older systems, even when the original manufacturer has
          gone bankrupt?’ and ‘Which design choice leads to which
          governance model?’



           18
   13   14   15   16   17   18   19   20   21   22   23