Sensor overload? How the Internet of Things will increase security risks

hand coming from mirror

A digital picture frame connected to the Internet could provide family photos, images of faraway lands ... and a point of entry for hackers trying to take over a home network in the near-future Internet of Things. (Stock image)

Look down at your iPhone, Android or tablet – it's filled with five to 10 data-producing sensors.

Modern kitchen appliances, smart vehicles, smart homes, and other objects that once had no relation to the Internet now contain dozens of sensors for all kinds of things – they read temperatures, they monitor your heart rate and perform countless other functions, all of them generating data.

More sensors means more Internet-connected devices, which translates to increased cybersecurity risk profiles for every human, machine and organization that makes use of them, and the world is about to become even more saturated with sensors, according to Robin Gilthorpe, chief executive officer of Terracotta Inc.

Speaking at a Sept. 12 FCW executive briefing on cybersecurity, Gilthorpe outlined the challenges inherent in a world fast approaching one trillion sensors.  

"The world is changing from an Internet of ideas to an Internet of things," Gilthorpe said, noting that some smart phones now come equipped with 10 to 15 sensors.

In October, Stanford University will host the first-ever Trillion Sensors Summit, inviting visionaries and industry experts to sound off on the issue. Industry predictions hold that the world will have more than a trillion sensors operating by 2023.

What the rapid growth in sensor technology and abundance means for the world is not yet clear. What is clear is that there will be exponentially more data available.

Cisco predicts there will be 25 billion devices connected to the Internet by 2015, and 50 billion by 2020, producing an interconnectedness of systems, software and a deluge of data almost unfathomably large.

But with the exponential growth in connections between data sets and systems comes increased - vulnerabilities.

Smart cars have been proven hackable through a variety of means, including malware introduced through an MP3 player. If the prospect of a remote attacker gaining access to your moving vehicle doesn't scare you, Gilthorpe said smart homes will be just as vulnerable. Something as simple as a poorly secured WiFi-connected digital picture frame could be enough to give future intruders an "in" to a home network of computers and private information.

The potential for damage is at once staggering and mysterious, especially for the government, which will certainly have decisions to make regarding what kinds of devices – and even appliances in office kitchens – to allow within federal facilities.

The Internet of Things won't just make more data, Gilthorpe said, it will drastically increase the amount of metadata – data about data – traveling at the speed of light between disparate systems. There may be significant opportunities for intelligence collection lurking within.

At a previous speaking engagement, Randy Garrett, a program manager for the Information Innovation Office at the Defense Advanced Research Projects Agency said the Internet of Things "makes you wonder what kind of world we'll have."

About the Author

Frank Konkel is a former staff writer for FCW.


  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.