Security Framework for IoT

Based on our research, there seems to be ample evidence to prove that our global Internet network infrastructure has been pushed beyond its security capabilities and that it has reached the limit of its original architectural design.Our Internet TCP/IP and (IMS) Multimedia Sub-Systems are fundamentally vulnerable to hacking attacks. The situation is like a carpenter trying to repair a leaking old ship in the middle of a storm… as one leak is plugged the next one squirts open and yet, more “patches” and plugs are fruitlessly issued, while the existential viability of the ship is under stress.

The vulnerabilities with x86 chipsets are just being exposed, while there’s probably an entire portfolio of zero-day exploits that are yet to be let loose in the wild. Creators of cyber-weapons may have lost tight control over some toolkits and these are now in the hands of malicious actors around the world. Therefore, we have to face the fact that an International effort is required to navigate our leaking ship to a safe harbour and there, make some fundamental repairs to the hull, so as to enable our journey in cyber-space to continue safely.

Most of the cyber security presentations that I have recently heard from all kinds of experts, they all seem to accept the fact that most companies and organizations will be hacked. Well, I am surprised that many are willing to accept that, especially in the UK where GDPR laws are coming online this year and getting hacked if not reported in time could get you into deep trouble.

We believe our global hacking epidemic has been caused by faulty and outdated internet system archictecture. The leaking ship is the result of having for years been adding network devices with multiple stack overlays and many times obsolete hardware. Our global IoT network has too many layers, too many obscure DNS routing paths through dark areas of the Internet, which still conduct traffic and are prone to attack. Legacy code and obsolete hardware are found in many countries and many different critical hardware components of the Internet are vulnerable. We must raise to the task and secure the information superhighway for future generations of free people around the world. We are facing literally an information existential threat that we have failed so far to fully conquer, but we must.

The internet of Things and the security of the web itself are still at significant risk of being hacked. Hacking has now become a state-actor sponsored activity and immense capital and technological resources are being poured into outsmarting all of our global Internet computer network security protections and protocols. These malicious actors are using Artificial Intelligence and advanced coding strategies to break into every kind of system, private and governmental. We have to stop this now.

We have to outsmart the hackers… we have to out-innovate the state-actors and leap ahead of all of these threats by conceptualizing, designing and building the Internet infrastructure of the future. We need to move away from obsolete hardware equipment that is rigid and implicitly weak and replace it with an IoT virtual digital network infrastructure, which is capable of reconfiguring itself according to the threat environment. We need to virtualize all of our switching and routing equipment in order to reach an entirely secure Internet of things. A new IoT Security Framework, protected and secured with advanced virtual network switching systems and new all-digital architecture.

We can reach our goal by integrating mobile networks with digital AI cognitive radio hardware. The future IoT infrastructure is being delivered in a new 5G “network of networks” where we shall be able to “ring-fence, protect and isolate” the public network from private, government and especially “Mission Critical Infrastructure” networks.

We believe the revolution brought about by adoption of Blockchain technology will be made manifest in the implementation of new “Secure Blockchain Connect” (UK Pat Pend TM) physical hardware,” together with incredibly advanced new technologies ready for delivery by several corporate giants, as well as other amazing start-ups.

In our case, starting with vehicular networks with our Secure Blockchain Connect products for all types of cars. Our Mission is to build networks of meta-nodes and of highly capable network clients at the edge… each one able to store and process information and together deliver a delay tolerant and highly secure network. We have a duty to the UK and to Europe to prevent system-wide IoT hacks and secure the future for an expanding, massively encompassing Internet.

In the United Kingdom we have all of the hardware and software technologies, the talent and world-class engineering and communications’ skills required to build it, if we work together with Europe and our Partners in the United States.

So, let’s build it together.

7 Replies to “Security Framework for IoT”

  1. Wow that was strange. I just wrote an very long comment but after I clicked submit my comment didn’t appear. Grrrr… well I’m not writing all that over again. Anyhow, just wanted to say fantastic blog!

  2. I’ve been exploring this topic for around 2 weeks at this point and this is actually the 1st blog that absolutely makes perfect sense. How come it’s really hard to access good material on the topic of security and safety nowadays? Surely understand the time you spent getting your concepts in to words so novices such as myself can certainly take action. Could there be a part two with your blog? Thank you again!

  3. I have learned newer and more effective things by your blog. One other thing I want to say is that newer personal computer operating systems are inclined to allow much more memory to get used, but they in addition demand more memory simply to perform. If someone’s computer can’t handle a lot more memory and the newest computer software requires that memory space increase, it usually is the time to shop for a new Computer system. Thanks

  4. I’m impressed, I must say. Actually not often do I encounter a blog that’s each educative and entertaining, and let me tell you, you might have hit the nail on the head. Your concept is excellent; the difficulty is one thing that not sufficient people are talking intelligently about. I’m very pleased that I stumbled across this in my seek for one thing relating to this.

Leave a Reply

Your email address will not be published. Required fields are marked *