Top Research Findings for Security IoT

David Lee Dang
CCA IxD Thesis Writings
2 min readOct 20, 2017
https://www.ariasystems.com/blog/wp-content/uploads/2016/03/Internet-of-Things-security-questions.jpg

For my thesis, I’ve narrowed it down to authentication in IoT. My research findings are based on secondary research and interviews. So far, I’ve interviewed with 4 people who uses IoT devices, and a security IT expert from Stanford. These are my top findings from my research so far:

  1. The opportunity for authentication in the IoT is to recognize the potential for enabling new ways of authenticating users via the devices and things that will surround us.
  2. Authentication needs to be both secure and convenient. Finding the right balance is important for the consumer because if it’s too hard, they won’t use it and if it’s too easy, it will be easy to be breach.
  3. The Best Password is no password.Passwords and PINs can easily be shared, lost, forgotten, hacked, or stolen and it is the only layer of authentication that is required.
  4. Using the smartphone for two-factor authentication is an early manifestation of this trend. The phone makes a powerful authentication factor because for most users, it is always with them.
  5. Authentication should be personal to the user in order to truly verify the identity of the individual.
  6. Biometric is unique to individuals. No two people share the same biometrics so they can’t be shared or forgotten.
  7. Authentication by design is essential right from the start of the development process in order to create trust, privacy, and security within IoT.

Stay tuned as I interview more security experts next week and gather more information.

--

--