IoT Security

In practice, IoT security varies significantly depending on where and how systems are deployed. Industrial and commercial IoT environments place very different demands on security design compared to consumer or office IT systems, particularly where devices are remotely installed, operate unattended, and rely on cellular connectivity rather than fixed networks.

Unlike traditional IT assets, IoT devices are rarely deployed in controlled environments. They are installed in plant rooms, substations, roadside cabinets, rooftops, vehicles, and outdoor enclosures. Physical access is often limited, infrequent, or costly. Once commissioned, many systems are expected to operate continuously for years with minimal human intervention.

Because of this, IoT security is as much an operational concern as it is a technical one. Decisions made during connectivity design, network exposure, and remote access configuration can have long-term consequences that are difficult to reverse later.

In critical infrastructure and commercial deployments, security failures do not remain isolated. Connected devices now underpin energy systems, transport networks, building management platforms, retail operations, and industrial automation. When these systems are compromised, the impact can extend beyond data loss to include service outages, loss of operational control, safety incidents, regulatory exposure, and long-term business disruption.


Why IoT Security Matters

IoT systems are increasingly embedded in environments where downtime is costly and failures can have physical or operational consequences. Energy assets, EV charging infrastructure, building management systems, digital signage networks, environmental monitoring platforms, and industrial control systems all depend on reliable connectivity and predictable device behaviour.

Unlike servers or desktops, IoT devices cannot simply be powered down for routine maintenance or security updates. They are often deployed at scale, geographically distributed, and connected over mobile networks. Accessing them physically can be time-consuming, expensive, or impractical.

This makes preventative security design essential. IoT systems must be secured in a way that remains effective over long lifecycles, tolerates intermittent connectivity, and does not rely on constant manual oversight.

IoT security also matters because many deployments blur the boundary between information technology and operational technology. Compromised devices may not only expose data, but also affect physical processes, safety systems, or customer-facing services. As adoption increases, so too does the need for security models that reflect this hybrid reality.


What Needs to Be Secured in an IoT System

Effective IoT security is layered. Focusing on a single component rarely provides meaningful protection. Each layer of an IoT system introduces its own risks and must be considered as part of an overall security design.

Device Layer

The device layer includes cellular routers, gateways, sensors, cameras, controllers, and embedded equipment deployed in the field. Security considerations at this level include firmware integrity, secure boot processes, authentication mechanisms, management interfaces, and physical access protection.

Devices should be hardened before deployment, as retroactive changes are often difficult to apply at scale. Unused services should be disabled, default credentials removed, and management access restricted to authorised channels only.

Connectivity Layer

Most industrial IoT systems rely on cellular connectivity such as 4G, 5G, NB-IoT, or LTE-M. This layer includes SIM profiles, APNs, IP addressing models, roaming behaviour, and how devices are exposed or isolated at the network level.

The choice between public and private IP addressing has significant security implications. Private addressing models, often combined with private APNs, reduce exposure by preventing direct inbound access from the public internet.

Network Layer

The network layer covers firewall rules, NAT behaviour, routing, VPN tunnels, and segmentation between devices and other systems. Poorly designed network access is one of the most common causes of IoT compromise.

In cellular deployments, the router or gateway is typically the primary security boundary. How it is configured determines whether devices are discoverable, how traffic is filtered, and how remote access is controlled.

Access Layer

Remote access by engineers, integrators, vendors, and monitoring platforms must be tightly controlled. This includes how users authenticate, what systems they can reach, and whether access is permanent or time-limited.

Many organisations are moving away from direct inbound access toward VPN-only or device-initiated access models, where systems establish outbound connections to trusted endpoints instead of accepting unsolicited inbound traffic.

Data Layer

IoT systems generate telemetry, alerts, logs, and sometimes control traffic. Protecting the confidentiality, integrity, and availability of this data is essential, particularly where systems interact with operational processes or safety-critical equipment.

Encryption, authentication, and secure data handling practices help ensure that data remains protected both in transit and at rest.


Why Most IoT Security Guidance Falls Short

A large proportion of IoT security guidance is written with consumer devices or enterprise IT systems in mind. While this advice may be appropriate for smart homes or office environments, it often fails to reflect the realities of industrial and commercial deployments.

Common gaps include assumptions that devices use Wi-Fi or fixed broadband, limited consideration of SIM-based connectivity, and an over-reliance on passwords as a primary security control. Many guides also overlook the operational challenges of long device lifecycles, restricted maintenance windows, and the cost of physical intervention.

Industrial IoT systems require security models that are resilient, repeatable, and designed to operate reliably over many years with minimal manual oversight.


The Most Common IoT Security Risk: Public Exposure

One of the most significant risks in IoT deployments is the exposure of devices directly to the public internet. This typically occurs when devices are assigned public IP addresses or when management interfaces are reachable without strict access controls.

Internet-wide scanning of exposed services is continuous and automated. Devices with open management ports can be discovered quickly and revisited repeatedly. Even systems that are initially well configured can become vulnerable over time as firmware ages, credentials are reused, or access requirements change.

For this reason, modern IoT security design increasingly favours private addressing models combined with controlled, authenticated access paths rather than open exposure.


How IoT Systems Are Commonly Attacked

IoT attacks rarely require advanced techniques. Most exploit predictable weaknesses at scale using automated tools.

Automated Discovery and Scanning

Internet-connected devices are continuously indexed by scanning services and search engines that catalogue exposed services. Cellular devices with public IP addresses can be discovered within minutes of coming online and remain visible indefinitely.

Credential Exploitation

Default or reused credentials remain one of the most exploited weaknesses in IoT. Automated attacks frequently attempt known username and password combinations against exposed devices, particularly where rate limiting or account lockout mechanisms are absent.

Firmware Vulnerabilities

Devices running outdated firmware are vulnerable to known exploits. Unlike desktop systems, IoT devices rarely update automatically, and many deployments continue to operate on firmware that is several years old.

Misconfigured Remote Access

Remote management services such as web interfaces, SSH, or legacy management protocols are often left enabled longer than intended. Temporary access granted for commissioning or support is frequently never revoked.

Forgotten Devices

One of the most underestimated risks is the device that was deployed and then forgotten. These units may remain online for years without monitoring or maintenance, providing a quiet entry point into wider networks.

In most cases, compromised IoT devices are not specifically targeted. They are simply discovered and exploited because they are reachable.


What Good IoT Security Looks Like in Practice

Well-secured IoT systems share a number of common characteristics. Devices are not directly exposed to the internet by default. Network access is restricted, and remote connections are established through secure, authenticated channels.

Firewall rules are explicit and minimal. Unused services are disabled. Remote access is logged and auditable. Monitoring systems are in place to detect unexpected behaviour, connectivity changes, or abnormal traffic patterns.

Importantly, IoT security is treated as an ongoing operational discipline rather than a one-time configuration exercise.


IoT Security vs Traditional IT Security

Although IoT security draws on principles from traditional IT security, the operating environments are fundamentally different. IoT devices are often installed in locations where physical access is limited or costly, rely on constrained power or bandwidth, and perform a single dedicated function.

Patching and upgrades must be carefully planned to avoid service disruption. Failures in the field can be significantly more expensive to resolve than issues in a data centre or office environment. As a result, IoT security must be predictable, resilient, and designed to fail safely.


IoT Security Standards and Regulation

IoT security is increasingly shaped by regulation and industry standards, particularly in the UK and EU. These frameworks typically emphasise secure default configurations, unique credentials, vulnerability management, and responsible disclosure practices.

While compliance alone does not guarantee security, adherence to recognised standards provides a baseline that helps reduce systemic risk across connected systems.


IoT Security Across the Device Lifecycle

Security requirements evolve as devices move through their lifecycle. During design and manufacture, secure boot mechanisms, firmware integrity, and update processes are critical. During deployment, network exposure and access controls must be configured correctly.

During operation, monitoring, credential management, and access reviews become increasingly important. At end of life, devices must be properly decommissioned to ensure they do not remain connected or accessible unintentionally.

Lifecycle-aware security design is a key differentiator between resilient IoT systems and fragile deployments.


Common IoT Security Questions

What is IoT security in simple terms?

IoT security is about protecting connected devices and the systems they interact with from unauthorised access, misuse, or disruption, particularly when those devices operate remotely and unattended.

Why is IoT security difficult?

IoT devices are often deployed in large numbers, rely on mobile networks, have long lifespans, and cannot be easily updated or physically accessed. These constraints make traditional security approaches harder to apply.

Are IoT devices more vulnerable than computers?

They can be, especially if they are exposed to the internet, run outdated firmware, or lack proper access controls. Many IoT devices prioritise reliability over active defence.

Is a firewall enough to secure IoT devices?

A firewall is important but only one part of a secure IoT architecture. Secure connectivity, controlled access, monitoring, and lifecycle management are equally important.

What is the difference between public and private IP addressing in IoT?

Public IP addressing allows devices to be reached directly from the internet, increasing exposure to attack. Private addressing restricts direct access and typically requires secure tunnels or gateways for remote access.

How are IoT systems monitored securely?

Secure monitoring usually involves encrypted connections, authenticated platforms, and alerting mechanisms that detect connectivity changes, abnormal traffic, or device failures. Devices should initiate outbound connections rather than accept inbound connections.


Written by Peter Green
Delivering communications and connectivity systems for over 25 years, with hands-on experience supporting secure industrial and commercial IoT deployments across multiple sectors.