Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach – and every kind of connected object must be assessed individually.

This is according to Steve Hanna, co-chair of the Trusted Computing Group’s (TCG) Embedded Systems Work Group, who highlights how the growing trend for greater connectivity puts everyday objects at risk of exploitation and makes mission critical systems in businesses and governments more vulnerable to attacks.

And while securing the IoT is often referred to as a singular movement, Hanna emphasises that every device had to be handled according to its individual needs, warning that there would be no single method that could be universally applied to safeguard devices.

“When you consider other security systems, for example a lock, what you would use for a front door is very different to what would be used for a bank or a government building because the scale of an attack would be much greater and more complex in the case of the latter,” he says. “The same is true for computers and embedded systems; when we think about security, we have to think about different levels that correspond to the level of risk.”

Hanna illustrates his point by comparing a baby monitor with a chemical plant – both of which are likely to become connected as standard in the near-future. For the latter, he said, the impact of an attack could be as serious as an explosion which would ultimately endanger human life.

“While it is important to secure things like baby monitors, for example, to avoid the devices being used to eavesdrop on conversations, there is a price point that needs to be met as well – no one is going to spend thousands of dollars on a baby monitor and for the manufacturers, that means the security solution needs to be less expensive,” he says.

“In the case of a chemical plant, the risk is much greater, the level of attack is likely to be more sophisticated and a serious amount of money could have been invested in carrying it out. As a result, the security measures need to be much more stringent.”

Hanna adds that the customised security approach required by the Internet of Things can be easily achieved using technologies that are available today.