{"id":11790,"date":"2012-01-03T20:55:09","date_gmt":"2012-01-04T01:55:09","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=11790"},"modified":"2021-07-26T17:28:12","modified_gmt":"2021-07-26T21:28:12","slug":"internet-of-things-3","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/internet-of-things-3\/","title":{"rendered":"Internet of Things"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-11944 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Internet-of-things\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/Internet-of-things.jpg?resize=87%2C85&#038;ssl=1\" alt=\"Internet of Things\" width=\"87\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/Internet-of-things.jpg?w=300&amp;ssl=1 300w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/Internet-of-things.jpg?resize=150%2C146&amp;ssl=1 150w\" sizes=\"auto, (max-width: 87px) 100vw, 87px\" \/>Once upon a time, back in 2005, there was a time when <strong>\u201cusing the Internet\u201d always meant using a computer.<\/strong> Today getting on the Intertubes is an expected feature for many devices. The next digital frontier is the physical world, where the \u201cInternet of Things.\u201d The <strong>Internet of Things will bring an online ability to objects<\/strong>.<\/p>\n<h4><a title=\"Twine Sensor Connects Household Objects to the Internet\" href=\"https:\/\/web.archive.org\/web\/20120201171530\/http:\/\/www.tested.com:80\/news\/twine-sensor-connects-household-objects-to-the-internet\/3228\/\" target=\"_blank\" rel=\"noopener noreferrer\">Twine Sensor Connects Household Objects to the Internet<\/a><\/h4>\n<p><em><a href=\"https:\/\/web.archive.org\/web\/20160702081243\/http:\/\/www.engineering.com\/ElectronicsDesign\/ElectronicsDesignArticles\/ArticleID\/5074\/TWINE-makes-the-Internet-of-Things-Simple-to-Use.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-99677\" title=\"Twine Sensor Connects Household Objects to the Internet\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IOT_TWINE-e1565051319823-150x121.jpg?resize=95%2C77&#038;ssl=1\" alt=\"Twine Sensor Connects Household Objects to the Internet\" width=\"95\" height=\"77\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IOT_TWINE-e1565051319823.jpg?resize=150%2C121&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IOT_TWINE-e1565051319823.jpg?resize=75%2C60&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/IOT_TWINE-e1565051319823.jpg?w=578&amp;ssl=1 578w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>\u00a0<\/em><a title=\"www.tested.com\" href=\"http:\/\/www.tested.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Tested.com<\/em><\/a> <a title=\"www.tested.com\" href=\"https:\/\/web.archive.org\/web\/20120201171530\/http:\/\/www.tested.com:80\/news\/twine-sensor-connects-household-objects-to-the-internet\/3228\/\" target=\"_blank\" rel=\"noopener noreferrer\">notes<\/a> a <a title=\"Kickstarter\" href=\"https:\/\/www.kickstarter.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Kickstarter<\/a> project from two <a href=\"http:\/\/www.media.mit.edu\/\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">MIT Media Lab<\/a> alums who developed a way to make the Internet of Things more available. A small, durable \u201cTwine\u201d sensor listens to its environment and reports back over <a title=\"Wi-Fi\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wi-Fi\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Wi-Fi<\/a>. The creators hope their new product will let regular users, even those without programming knowledge, digitally manage their surroundings.<\/p>\n<p>A basic Twine unit senses temperature and motion, but other options like moisture detection, a magnetic switch, and more can be added using a breakout board. The various sensors and built-in Wi-Fi can be powered by either a <a title=\"Universal Serial Bus\" href=\"http:\/\/en.wikipedia.org\/wiki\/Universal_Serial_Bus\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">mini-USB<\/a> connection or two AAA batteries, which will keep it running for months. Twine readings get wirelessly loaded into the appropriately named Spool web app, where users can set simple if-then triggers that create <a title=\"SMS\" href=\"http:\/\/en.wikipedia.org\/wiki\/SMS\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">SMS messages<\/a>, <a title=\"Twitter\" href=\"https:\/\/www.twitter.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">tweets<\/a>, emails, or specially configured <a title=\"Hypertext Transfer Protocol\" href=\"http:\/\/en.wikipedia.org\/wiki\/Hypertext_Transfer_Protocol\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">HTTP requests<\/a>.<\/p>\n<p>For a donation of $99 or more will get you a basic unit when they ship in March.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.gizmag.com\/twine-internet-of-things\/20583\/\" target=\"_blank\" rel=\"noopener noreferrer\">Twine wants to put your things on the internet<\/a> (gizmag.com)<\/li>\n<\/ul>\n<h4><a title=\"THE SMART FRRRIDGE. Chilly Forecast for Internet Frrridge\" href=\"https:\/\/web.archive.org\/web\/20160804003114\/http:\/\/medienturm.at\/mt.php?_pid=874&amp;id=2&amp;k=full&amp;sid=339&amp;sp=EN\" target=\"_blank\" rel=\"noopener noreferrer\">THE SMART FRRRIDGE. Chilly Forecast for Internet Frrridge<\/a><\/h4>\n<p><a href=\"https:\/\/web.archive.org\/web\/20150320001041\/http:\/\/archrecord.construction.com:80\/innovation\/4_Products\/0310products.asp\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-11948 alignright\" style=\"border: 0pt none;\" title=\"InternetFridge\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/InternetFridge.jpg?resize=99%2C100&#038;ssl=1\" alt=\"Internet Fridge\" width=\"99\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/InternetFridge.jpg?w=280&amp;ssl=1 280w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/InternetFridge.jpg?resize=148%2C150&amp;ssl=1 148w\" sizes=\"auto, (max-width: 99px) 100vw, 99px\" \/><\/a>The Smart Frrridge is a new version of the familiar kitchen apparatus. <a title=\"www.medienturm.at\" href=\"https:\/\/web.archive.org\/web\/20160804003114\/http:\/\/medienturm.at\/mt.php?_pid=874&amp;id=2&amp;k=full&amp;sid=339&amp;sp=EN\" target=\"_blank\" rel=\"noopener noreferrer\">According<\/a> to <em><a title=\"www.medienturm.at\" href=\"http:\/\/www.medienturm.at\/\" target=\"_blank\" rel=\"noopener noreferrer\">Medienturn<\/a><\/em> the new fridge comes with a built-in computer that can be connected to the internet. It is one of a growing class known as \u201c<a title=\"Internet appliance\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Internet_appliance\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Internet appliances<\/a>\u201d that include not only smartphones but\u00a0also web-enabled versions of typical household appliances.<\/p>\n<p>The refrigerator keeps an eye on the food in it by using <a title=\"Radio-frequency identification\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Radio-frequency_identification\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">RFID<\/a> technology, a digital camera, and <a title=\"Image processing\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Image_processing\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">image processing<\/a>. These technologies allow the fridge to keep track of what&#8217;s in it, how long has this been there, should it be trashed?<\/p>\n<p>To keep in contact with the Smart Frrridge all you have to do is to pick up your <a title=\"Mobile phone\" href=\"https:\/\/web.archive.org\/web\/20150516022240\/http:\/\/www.business.com:80\/telecommunications\/phone-services\/?\" target=\"_blank\" rel=\"businesscom noopener noreferrer\">mobile phone<\/a> and call. It will be able to suggest a menu that uses the foods inside and generate a shopping list of the missing ingredients and place the order online.<\/p>\n<p>The Smart Frrridge cab also be used to watch television, listen to music, to take a photograph, save it to an album, or post it to a website, or send it to an email recipient. The comes with a docking station you can just dock in your <a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a title=\"www.apple.com\/ipod\/\" href=\"https:\/\/www.apple.com\/ipod\/\" target=\"_blank\" rel=\"noopener noreferrer\">iPod<\/a> or <a title=\"iPhone\" href=\"http:\/\/www.apple.com\/iphone\" target=\"_blank\" rel=\"homepage noopener noreferrer\">iPhone<\/a> and start using all your favorite cooking apps.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.ilounge.com\/index.php\/reviews\/entry\/belkin-fridge-mount-for-ipad-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">First Looks: Belkin Fridge Mount for iPad 2<\/a> (ilounge.com)<\/li>\n<li><a href=\"http:\/\/www.trendhunter.com\/trends\/in-my-fridge\" target=\"_blank\" rel=\"noopener noreferrer\">Futuristic RFID Refrigerator &#8211; In My Fridge Displays What&#8217;s Inside Without the Need to Open It (TrendHunter.com)<\/a> (trendhunter.com)<\/li>\n<\/ul>\n<h4><a title=\"SCADA: How Big a Threat?\" href=\"https:\/\/web.archive.org\/web\/20160403035334\/http:\/\/www.dailywireless.org\/2011\/11\/21\/scada-how-big-a-threat\/\" target=\"_blank\" rel=\"noopener noreferrer\">SCADA: How Big a Threat?<\/a><\/h4>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-11961 alignright\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"cyber attacker\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/cyber-attacker-e1565050830195.jpg?resize=132%2C99&#038;ssl=1\" alt=\"Cyber attacker\" width=\"132\" height=\"99\" \/>There are reports of two recent cyber attacks on <a title=\"Critical infrastructure\" href=\"https:\/\/en.wikipedia.org\/wiki\/Critical_infrastructure\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">critical infrastructure<\/a> in the US. <em><a title=\"threatpost.com\" href=\"https:\/\/threatpost.com\/en_us\/blogs\/hacker-says-texas-town-used-three-character-password-secure-internet-facing-scada-system-11201\" target=\"_blank\" rel=\"noopener noreferrer\">Threatpost<\/a><\/em> says the hacker who compromised the <a title=\"Infrastructure\" href=\"https:\/\/en.wikipedia.org\/wiki\/Infrastructure\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">water infrastructure<\/a> for <a title=\"South Houston, Texas\" href=\"http:\/\/maps.google.com\/maps?ll=29.6611111111,-95.2297222222&amp;spn=0.1,0.1&amp;q=29.6611111111,-95.2297222222%20%28South%20Houston%2C%20Texas%29&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">South Houston, TX<\/a>, said the district used a three-letter password, making it easy to break in.<\/p>\n<p>There are also reports that a <a title=\"Cyberwarfare\" href=\"https:\/\/en.wikipedia.org\/wiki\/Cyberwarfare\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">cyberattack<\/a> destroyed a water pump belonging to a Springfield, IL water utility. There are <a title=\"www.wired.com\" href=\"https:\/\/web.archive.org\/web\/20140221153637\/http:\/\/www.wired.com:80\/threatlevel\/2011\/11\/water-pump-hack-mystery-solved\/\" target=\"_blank\" rel=\"noopener noreferrer\">mixed<\/a> reports that an attacker gained unauthorized access to that company\u2019s industrial control system.<\/p>\n<p><a title=\"www.dailywireless.org\" href=\"https:\/\/web.archive.org\/web\/20160403035334\/http:\/\/www.dailywireless.org\/2011\/11\/21\/scada-how-big-a-threat\/\" target=\"_blank\" rel=\"noopener noreferrer\">According<\/a> to <a title=\"www.dailywireless.org\" href=\"http:\/\/www.dailywireless.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>DailyWireless<\/em><\/a>, <a title=\"SCADA\" href=\"https:\/\/en.wikipedia.org\/wiki\/SCADA\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Supervisory Control And Data Acquisition<\/a> (SCADA) software monitors and controls various industrial processes, some of which are considered critical infrastructure.<\/p>\n<p>Researchers have warned about attacks on critical infrastructure for some time, but warnings became reality after a highly complicated computer worm, <a title=\"www.symantec.com\" href=\"https:\/\/web.archive.org\/web\/20220817131457\/https:\/\/www.csoonline.com\/article\/3218104\/what-is-stuxnet-who-created-it-and-how-does-it-work.html\" target=\"_blank\" rel=\"noopener symantec noreferrer\">Stuxnet<\/a>, attacked and destroyed centrifuges at a uranium enrichment facility in <a title=\"www.cia.gov\" href=\"https:\/\/web.archive.org\/web\/20201229023715\/https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/geos\/ir.html\" target=\"_blank\" rel=\"noopener noreferrer\">Iran<\/a>.<\/p>\n<p>German cybersecurity expert Ralph Langner <a title=\"blog.ted.com\" href=\"http:\/\/blog.ted.com\/2011\/03\/29\/cracking-stuxnet-a-21st-century-cyber-weapon-ralph-langner-on-ted-com\/\" target=\"_blank\" rel=\"noopener noreferrer\">found<\/a> Stuxnet, the most advanced worm he had ever seen. The cybersecurity expert warns that U.S. utility companies are not ready to deal with the threat.<\/p>\n<p>In a TED Talk Langner stated that \u201cThe leading force behind Stuxnet is the cyber superpower \u2013 there is only one, and that\u2019s the United States.\u201d<\/p>\n<p>In a recent speech at the <a title=\"Brookings Institution\" href=\"http:\/\/www.brookings.edu\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Brookings Institution<\/a>, he also made the bigger point that having developed Stuxnet as a computer weapon, the United States has in effect introduced it into the world\u2019s cyber-arsenal.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/powersthatbeat.wordpress.com\/2011\/12\/15\/dont-say-i-never-told-you-researcher-warned-congress-of-stuxnet-variants-10-months-ago-threatpost\/\" target=\"_blank\" rel=\"noopener noreferrer\">Don&#8217;t Say I Never Told You: Researcher Warned Congress Of Stuxnet Variants 10 Months Ago | threatpost<\/a> (powersthatbeat.wordpress.com)<\/li>\n<li><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/12\/13\/fbi-acknowledges-more-scada-attacks-increases-cyber-budget\/\" target=\"_blank\" rel=\"noopener noreferrer\">FBI acknowledges more SCADA attacks, increases cyber budget<\/a> (nakedsecurity.sophos.com)<\/li>\n<\/ul>\n<h4><a title=\"New NIST Report Sheds Some Light On Security Of The Smart Grid\" href=\"https:\/\/web.archive.org\/web\/20100822214626\/http:\/\/www.darkreading.com:80\/insiderthreat\/security\/perimeter\/showArticle.jhtml?articleID=220300142\" target=\"_blank\" rel=\"noopener noreferrer\">New NIST Report Sheds Some Light On Security Of The Smart Grid<\/a><\/h4>\n<p><a href=\"http:\/\/www.nist.gov\/index.html\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-13085 \" title=\"nist_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/nist_logo.jpg?resize=132%2C45&#038;ssl=1\" alt=\"NIST\" width=\"132\" height=\"45\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/nist_logo.jpg?resize=150%2C51&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/nist_logo.jpg?resize=75%2C25&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/12\/nist_logo.jpg?w=381&amp;ssl=1 381w\" sizes=\"auto, (max-width: 132px) 100vw, 132px\" \/><\/a><em><a title=\"www.darkreading.com\" href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">DarkReading<\/a> <\/em><a title=\"www.darkreading.com\" href=\"https:\/\/web.archive.org\/web\/20100822214626\/http:\/\/www.darkreading.com:80\/insiderthreat\/security\/perimeter\/showArticle.jhtml?articleID=220300142\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> the <a title=\"National Institute of Standards and Technology\" href=\"http:\/\/en.wikipedia.org\/wiki\/National_Institute_of_Standards_and_Technology\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">National Institute of Standards and Technology<\/a> (NIST) released a <a title=\"csrc.nist.gov\" href=\"http:\/\/csrc.nist.gov\/publications\/nistir\/ir7628\/introduction-to-nistir-7628.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> (PDF) by the <a title=\"Cyber Security Coordination Task Group\" href=\"https:\/\/web.archive.org\/web\/20181108124126\/https:\/\/collaborate.nist.gov\/twiki-sggrid\/bin\/view\/SmartGrid\/CyberSecurityCTG\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Security Coordination Task Group<\/a>. The report from the Task Group which heads up the security strategy and architecture for the nation&#8217;s <a title=\"Smart grid\" href=\"http:\/\/en.wikipedia.org\/wiki\/Smart_grid\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">smart power grid<\/a> includes risk assessment, security priorities, as well as <a title=\"Privacy\" href=\"http:\/\/en.wikipedia.org\/wiki\/Privacy\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">privacy issues<\/a>.<\/p>\n<p>The smart grid makes the <a title=\"Electrical grid\" href=\"http:\/\/en.wikipedia.org\/wiki\/Electrical_grid\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">electrical power grid<\/a> a two-way flow of data and electricity allows consumers to remotely monitor their power usage in real-time to help conserve energy and save money. <em>DarkReading<\/em> says researchers have raised red flags about the security of the smart grid. Some have already poked holes in the grid, including <a title=\"IOActive\" href=\"http:\/\/ioactive.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">IOActive<\/a> researcher Mike Davis, who found multiple vulnerabilities in smart meters, including devices that don&#8217;t use encryption nor do they authenticate users when updating software. He was able to execute buffer overflow attacks and unleash rootkits on <a title=\"Smart meter\" href=\"http:\/\/en.wikipedia.org\/wiki\/Smart_meter\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">smart meters<\/a>.<\/p>\n<p>Tony Flick, a smart grid expert with <a title=\"FYRM Associates\" href=\"http:\/\/www.fyrmassociates.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FYRM Associates<\/a>, at Black Hat USA <a title=\"www.blackhat.com\" href=\"http:\/\/www.blackhat.com\/presentations\/bh-usa-09\/FLICK\/BHUSA09-Flick-HackingSmartGrid-PAPER.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">talked<\/a> (PDF) about his worries over utilities &#8220;self-policing&#8221; their implementations of the security framework. &#8220;This is history repeating itself,&#8221; Mr. Flick said in an interview with <em>DarkReading<\/em>.<\/p>\n<p>According to <em>DarkReading<\/em>, the report recommends smart grid vendors carry out some pretty basic security practices:<\/p>\n<ul>\n<li>Audit personally identifiable information (<a title=\"Personally identifiable information\" href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">PII<\/a>) data access and changes;<\/li>\n<li>Specify the purpose for collecting, using, retaining, and sharing PII;<\/li>\n<li>Collect only PII data that&#8217;s needed;<\/li>\n<li>Anonymize PII data where possible and keep it only as long as necessary;<\/li>\n<li><a title=\"Advanced Metering Infrastructure\" href=\"http:\/\/en.wikipedia.org\/wiki\/Advanced_Metering_Infrastructure\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Advanced Metering Infrastructure<\/a> (AMI) must set up protections against denial-of-service (<a title=\"Denial-of-service attack\" href=\"http:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">DoS<\/a>) attacks;<\/li>\n<li>Network perimeter devices should filter certain types of packets to protect devices on an organization&#8217;s internal network from being directly affected by denial-of-service attacks;<\/li>\n<li>The AMI system should use redundancy or excess capacity to reduce the impact of a DoS;<\/li>\n<li>AMI components accessible to the public must be in separate subnetworks with separate physical network interfaces;<\/li>\n<li>The AMI system shall deny network traffic by default and allows network traffic by exception;<\/li>\n<li>Consumers&#8217; access to smart grid meters be limited. Authorization and access levels need to be carefully considered.<\/li>\n<\/ul>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.zdnet.com\/blog\/green\/utilities-caught-flat-footed-in-smart-grid-security\/19599\" target=\"_blank\" rel=\"noopener noreferrer\">Utilities caught flat-footed in smart-grid security<\/a> (zdnet.com)<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20151024175129\/https:\/\/blogs.cisco.com\/cle\/how-smart-grid-and-broadband-work-together\" target=\"_blank\" rel=\"noopener noreferrer\">How Smart Grid and Broadband Work Together<\/a> (blogs.cisco.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Getting on the web is an expected feature for many devices Internet of Things brings new threats to once safe devices like TVs and refrigerators<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2197,420,952,953,101,947,948,768,950,944,120,949,505,951,941,4,946,46,765,943,945,579],"class_list":["post-11790","post","type-post","status-publish","format-standard","hentry","category-security","tag-2197","tag-aapl","tag-advanced-metering-infrastructure","tag-ami","tag-apple","tag-critical-infrastructure","tag-cyber-attack","tag-denial-of-service-attack","tag-electrical-power-grid","tag-iot","tag-mit","tag-nist","tag-personally-identifiable-information","tag-pii","tag-scada","tag-security","tag-smart-refrigerators","tag-smart-grid","tag-stuxnet","tag-ted","tag-twine","tag-wi-fi-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=11790"}],"version-history":[{"count":21,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11790\/revisions"}],"predecessor-version":[{"id":132123,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/11790\/revisions\/132123"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=11790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=11790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=11790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}