DC-IoT Progressing Global Good Practice for the Internet of Things | IGF 2023

11 Oct 2023 00:45h - 02:15h UTC

Event report

Speakers and Moderators

Speakers:
  • Vint Cerf, Google, USA
  • Hiroshi Esaki, University of Tokyo, President JPNIC Board of Directors, Japan
  • Orly Lobel, University of San Diego, USA
  • Sarah T. Kiden, Northumbrai University, Uganda
  • Alejandro Pisanty/Olivier Crépin-Leblond, DC CIV
Moderators:
  • Maarten Botterman, ICANN Board; GNKS Consult; DC IoT Chair; Netherlands
  • Olivier Crépin-Leblond, DC CIV Chair; France

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Wout de Natris

Summary:
The analysis of IoT security policies across different countries revealed some significant findings. Firstly, there is a noticeable gap in the policy framework for IoT security, particularly in many countries of the Global South. This suggests that these countries lack comprehensive guidelines and regulations to address IoT device security challenges. Additionally, national policy practices for IoT security often differ significantly from those of other countries, indicating a lack of alignment and standardization. The study highlights the importance of implementing accountability frameworks throughout the IoT device lifecycle. The complexity of IoT security requires a comprehensive approach that considers factors such as data privacy, cybersecurity, and standards. Governments are urged to prioritize security by design during hardware and software procurement to enhance security standards. Lack of user awareness about data privacy implications necessitates improved education and awareness campaigns. Data security standards are recommended to protect against abuse and misuse of data. The analysis raises concerns about future implications of data insecurity, emphasizing the need for proactive actions to address IoT security challenges. These findings provide insights for policymakers and stakeholders in developing robust IoT security strategies and frameworks.

Mark Carvell

The discussion centred around key topics related to the Internet of Things (IoT) and its impact on society. One important point raised was the necessity for a universal labelling scheme for IoT devices to ensure harmonisation and clarity for consumers. The argument posited was the need for a standardised labelling system that enables easy identification and comprehension of IoT products, especially as individuals increasingly travel with their devices. The sentiment surrounding this topic was neutral, reflecting concerns without strong opinions expressed.

Another topic of discussion was the role of public administrations in IoT applications, particularly in addressing government concerns about security. The question was raised regarding how IoT applications can meet government security requirements, given the interactions between governments and citizens. This inquiry underscored the significance of striking a balance between innovation and security in IoT technologies. The sentiment surrounding this topic was also neutral, highlighting the need for further exploration and understanding.

Ethical considerations in the development of IoT systems and networks were also emphasised during the discussion. The unpredictability factor associated with IoT development was addressed, and developers were encouraged to ensure that their systems and networks are developed ethically. This topic generated a positive sentiment, indicating a belief in the paramount importance of ethical innovation in the IoT industry. The sentiment reflected a acknowledgment of the potential ethical challenges posed by the rapid advancement of IoT technologies.

Lastly, there was an encouragement for the dynamic coalition to utilise the EUDIG platform for advocacy purposes. The EUDIG platform was described as having a call for issues, and a forum was scheduled to take place in Vilnius in June. The sentiment surrounding this topic was positive, indicating a belief in the effectiveness and value of using the EUDIG platform for advocacy.

In conclusion, the discussion covered a range of important topics related to the IoT and its societal impact. These topics included the need for a universal labelling scheme, the role of public administrations in ensuring security, ethical innovation in IoT development, and the value of using the EUDIG platform for advocacy. It is evident that there are various considerations and challenges associated with implementing and developing IoT technologies, and further exploration and collaboration are necessary to effectively address these issues.

Barry Lieber

Security for the Internet of Things (IoT) is a multifaceted and intricate issue, encompassing factors such as authentication, confidentiality, and data integrity. Barry, an expert with almost 25 years of experience in the field, emphasizes the importance of prioritising IoT security. To fully comprehend and address this issue, it is necessary to break it down into various components.

The integration of different sources is paramount in realising the full potential of the IoT. The seamless communication and collaboration among diverse devices, such as cars, houses, and calendars, serve as prominent examples of how integration enhances the IoT experience. However, the complexity of maintaining this integration while ensuring security and privacy presents a significant challenge.

Authentication is one aspect of IoT security that requires careful consideration. With numerous devices exchanging information and interacting within the IoT, it is crucial to establish secure methods of verifying their identities. This helps prevent unauthorised access and malicious activities, safeguarding the overall IoT ecosystem.

Confidentiality is another significant factor in IoT security. As vast amounts of sensitive data are transmitted and processed within the IoT, protecting this information from unauthorised disclosure is imperative. Implementing robust encryption protocols and secure data storage mechanisms becomes crucial to maintaining confidentiality and safeguarding user privacy.

Data integrity plays a pivotal role in IoT security as well. With the vast quantity of data being communicated and processed within the IoT network, it is essential to ensure its accuracy, consistency, and reliability. Implementing mechanisms for data validation, verification, and error detection is vital to maintain the integrity of the information exchanged within the IoT environment.

The analysis of the various supporting facts and arguments highlights that security is not merely a buzzword in the IoT landscape. The inherent complexities involved in integrating diverse systems while maintaining security and privacy underscore the challenges faced in fully harnessing the potential of the IoT. The insights gained from this analysis underscore the need for ongoing research, development, and implementation of robust security measures to address the complexities and mitigate the risks associated with IoT security.

In conclusion, security for the Internet of Things is a multifaceted and complex issue that necessitates attention to various factors such as authentication, confidentiality, and data integrity. The integration of different sources is crucial in unlocking the true potential of the IoT, but it also poses challenges in maintaining security and privacy. With the rapid expansion of the IoT landscape, it is imperative to invest in developing and implementing robust security measures to safeguard the IoT ecosystem and protect user information.

Elaine Liu

The speakers in the discussion agree that IoT (Internet of Things) should have different policies and guardrails depending on the use cases involved. They argue that considering the diverse range of data collection in IoT, which can vary from consumer to organizational to agency levels, it is vital to establish suitable policies that address the specific needs and risks associated with each use case. This approach recognizes the importance of tailoring regulations to the unique characteristics and requirements of different IoT applications.

Furthermore, the speakers emphasize the significance of taking into account the entire value chain when setting guiding principles for IoT. They highlight that hardware, software, operating systems, and data analytics all play crucial roles in the IoT process. By considering the entire value chain, policymakers can develop comprehensive and effective guidelines that address various aspects of IoT implementation, ensuring its smooth and secure operation.

These discussions align with SDG 9: Industry, Innovation, and Infrastructure, which emphasises the need to foster sustainable industrialisation, promote research and development, and enhance access to information and communication technologies. IoT is a key aspect of Industry 4.0 and digital transformation, and thus, setting appropriate policies and guidelines for IoT corresponds to addressing the goals and targets outlined in SDG 9.

The speakers’ arguments are supported by the evidence provided throughout the discussion. They acknowledge the complexity and diversity of IoT applications and the need for tailored policies to manage the risks associated with each use case. Additionally, they emphasise the interconnected nature of the IoT value chain, where hardware, software, operating systems, and data analytics all contribute to the overall functionality and performance of IoT systems. Therefore, their arguments are well-grounded and offer valuable insights for policymakers and stakeholders involved in IoT governance.

In conclusion, the speakers advocate for the development of different policies and guidelines for IoT based on its specific use cases. They also stress the importance of considering the entire value chain, encompassing hardware, software, operating systems, and data analytics, when setting guiding principles for IoT. These discussions align with the objectives of SDG 9 and provide valuable insights into the complexities and requirements of IoT governance.

Alejandro Pisanty

The analysis reveals several key points related to the consumer Internet of Things (IoT) and its impact on security, industry, and infrastructure.

Firstly, consumer IoT devices are causing significant concern regarding security. It is essential to identify the entities that are leveraging IoT to exert power. These entities may include individuals, organisations, or even governments. Identifying these entities is crucial to establish accountability and take necessary security measures to protect against potential breaches or attacks.

Secondly, the development of consumer IoT is primarily driven by small companies. These companies often produce and sell IoT devices at very low prices, making them accessible to a wide range of consumers. However, this also creates challenges in terms of security awareness and compliance. Consumers may not be fully aware of the need to secure their devices or the potential risks associated with them. Additionally, the affordability of these devices means that they may not undergo rigorous security testing or meet established standards.

Furthermore, the deployment of consumer IoT devices poses challenges to openness, interoperability, and core internet values. Different technologies and standards are used for communication between these devices, making it difficult to establish the necessary interoperability and ensure seamless connectivity. This can lead to fragmented systems and hinder the growth and development of IoT applications. Additionally, the increased deployment of these devices expands the attack surface for everyone. With numerous connected devices, the potential for vulnerabilities and cyber-attacks increases, posing a threat to individual privacy, data security, and overall network integrity.

Moreover, the sale of many IoT devices occurs outside the oversight of national standardisation bodies. This means that these devices may not adhere to specific standards or regulations, raising concerns about their compliance and quality. The lack of standardisation can lead to compatibility issues and hinder collaboration and innovation in the broader IoT ecosystem.

In conclusion, the analysis highlights the urgent need for enhanced security measures, awareness, and standardisation efforts in the consumer IoT sector. It is vital to address the security concerns surrounding these devices, identify the entities responsible for IoT deployments, and ensure that consumers are informed about the importance of securing their devices. Additionally, industry stakeholders should collaborate to establish common technological standards and guidelines to promote openness, interoperability, and cybersecurity in the consumer IoT realm. By doing so, the potential of IoT can be fully realised while simultaneously safeguarding privacy and ensuring the integrity of connected systems.

Sandoche Balakrichenan

The presentations on IoT emphasized the significance of interoperability, scalability, and zero trust. It was argued that these features are essential for the success of IoT. The domain name system (DNS) was proposed as a potential solution for IoT-based identity and access management in a zero-trust environment. DNS is widely used for communication by internet users and can potentially be used for IoT as well, enabling secure and controlled access to IoT devices and systems.

LoRaWAN, regarded as one of the most constrained networks in IoT, was highlighted as an ideal testing ground for the concept of interoperability, scalability, and zero trust. The successful implementation of this concept with LoRaWAN could potentially be applied to other IoT networks and devices.

AFNIC, a prominent organisation, is developing a dynamic identity management system based on DNS. The aim of this system is to enable interoperability among various types of identifiers such as RFID and barcodes, facilitating efficient and effective management of identities within the IoT ecosystem.

The use of DNS and DANE (DNS-based Authentication of Named Entities) was discussed as a way to eliminate the need for a certificate authority ecosystem. This approach, combined with the successful tests of TLS 1.3 and ongoing efforts to add privacy features, highlights the potential of DNS and DANE to achieve dynamic, scalable, and zero trust capability in IoT.

The presentations also touched upon the collaboration between the supply chain industry and IoT, particularly in relation to GS1 devices such as barcodes and RFID. This collaboration highlights the integration of technology systems with the supply chain industry, fostering innovation and enhancing efficiency.

Furthermore, the speaker mentioned the use of LoRaWAN with MAC IDs, showcasing an alternative approach to identification beyond traditional names and IP addresses. This demonstrates that concerns in IoT extend beyond conventional methods and require exploration of new and diverse approaches.

In conclusion, the presentations underscored the importance of interoperability, scalability, and zero trust in IoT. The potential application of DNS for IoT-based identity and access management, the development of a dynamic identity management system by AFNIC, and the use of DNS and DANE to eliminate the need for a certificate authority ecosystem were notable insights. The collaboration between the supply chain industry and IoT, as well as the exploration of alternative identification methods such as LoRaWAN with MAC IDs, further exemplify the dynamic nature of IoT and the need for innovative solutions.

Dan Caprio

In a recent discussion on the Internet of Things (IoT), it was highlighted that there is a significant power asymmetry between consumers and their understanding of IoT. This issue has been observed not only in the United States but also in other parts of the world.

To address this, the US government has launched an ongoing effort aimed at bringing consumer labelling to the IoT. This initiative is being carried out through a public-private partnership, with the Federal Communications Commission (FCC) being responsible in the US. The aim is to ensure responsible consumption and production in the IoT sector, in line with SDG 12: Responsible Consumption and Production.

This labelling scheme would involve putting labels on IoT device packaging, providing consumers with information about the level of security offered. This proposed labelling system is seen as a means to empower consumers by giving them the necessary information to make informed choices and protect themselves in the rapidly growing IoT landscape.

Furthermore, having consumer labels on IoT devices could also facilitate international harmonisation. The idea is that these labels could pave the way for global standards and interoperability in the IoT industry. This notion aligns with Vint Cerf’s view on the importance of standards and interoperability in the IoT ecosystem.

However, it is important to note that the US consumer label for IoT is still in its early stages. The FCC announced this initiative in August, but it will not take effect until at least the end of next year. Therefore, additional work is required to develop and implement a comprehensive labelling system that effectively serves the needs of consumers.

During the discussion, it was suggested that the Internet Governance Forum (IGF) should play an active role in addressing this issue. It was acknowledged that raising awareness and fostering dialogue around consumer labelling in the IoT is a crucial step towards ensuring responsible and secure IoT adoption. It was proposed that the IGF, along with regional IGFs, should include this topic in their agendas and actively engage stakeholders in finding effective solutions.

Overall, the discussion emphasized the need for consumer empowerment and protection in the IoT sector. The ongoing efforts in the US to introduce consumer labelling and the potential for international harmonisation through such initiatives are promising steps in the right direction. However, more work needs to be done to ensure that a comprehensive and effective labelling system is developed and implemented. The active involvement of the IGF and its regional counterparts can significantly contribute to addressing this issue and promoting responsible IoT practices.

Vint Cerf

The speakers in the analysis delve into various crucial aspects of the Internet of Things (IoT). They highlight the importance of standards and interoperability in order to ensure that devices from multiple manufacturers can effectively work together. This is crucial for the IoT to reach its full potential as it allows for seamless communication and integration between devices. It also enables consumers to configure their IoT devices in a way that is useful and tailored to their specific needs. The argument put forth is that without standards and interoperability, the IoT ecosystem would be fragmented and hindered by compatibility issues.

Another key point discussed is the need for secure and upgradeable operating systems for IoT devices. The speakers emphasise that every IoT device will require an operating system, and with that comes the need for regular updates and bug fixes. The argument is made that these updates are necessary to address vulnerabilities and ensure the overall security of the devices. Without secure and upgradeable operating systems, IoT devices are at risk of exploitation by malicious actors.

The speakers also stress the significance of strong authentication, cryptography, and digital signatures in the context of IoT devices. They argue that these measures are crucial for ensuring trusted communication between devices. The speakers assert that IoT devices need to have a strongly authenticated identity and must also be aware of what other devices they are allowed to communicate with. By implementing cryptography and digital signatures, IoT devices can authenticate and verify the integrity of the data being exchanged, reducing the risk of unauthorized access or tampering.

Additionally, the scalability of configuration management and control for IoT devices is highlighted. The speakers note that in residential settings, the number of devices could easily reach the hundreds, while in industrial settings, it could be in the thousands. They argue that effective configuration management and control systems need to be in place to handle the sheer volume of devices and ensure efficient and reliable operation.

However, one speaker expresses a negative sentiment towards voice recognition as a control method for IoT devices. They highlight concerns regarding the reliability of voice recognition technology, as it is not 100% accurate and can lead to frustration for users. Moreover, there is the possibility of misuse, where unauthorized individuals could gain access to IoT devices by mimicking the owner’s voice. This raises security concerns and questions the reliability of voice recognition as a viable control method for the IoT.

In a somewhat unrelated observation, the analysis briefly mentions Vint Cerf’s extensive wine collection in his house, with approximately 3,000 bottles. It is suggested that the next owner of his house will have the responsibility of managing this impressive collection.

In conclusion, the speakers emphasize the importance of standards, interoperability, secure operating systems, strong authentication, cryptography, and digital signatures in the world of IoT. These elements are seen as crucial for the successful deployment and operation of IoT devices. Additionally, the scalability of configuration management and control systems is acknowledged as a critical factor in managing a large number of IoT devices. It is important to carefully consider the control methods used for IoT devices, as voice recognition may not be the most reliable option due to its limitations and potential for misuse.

Hiroshi Esaki

According to experts, the correct functioning of artificial intelligence (AI) relies heavily on trustworthy data. AI does not have its own algorithm; instead, it requires reliable data to provide accurate and insightful results. This emphasizes the importance of data quality and integrity in AI systems.

In the business field, IoT devices are increasingly prevalent across various industries, including agriculture. These devices offer numerous benefits, such as improved efficiency, increased productivity, and enhanced decision-making. However, to fully leverage the potential of IoT, there is a need for good ownership, responsibility, and authentication. This ensures that the devices are used ethically and securely, protecting sensitive data and mitigating potential risks.

The evolution of IoT into the Internet of Functions (IOF) brings a paradigm shift from traditional cloud computing systems. With IOF, functions can be transferred and executed anywhere over the internet. This opens up new possibilities for decentralized and distributed systems, enabling greater flexibility and scalability in IoT networks.

One critical aspect of the IoT ecosystem is the security of devices. To ensure secure and safe IoT deployment, scalable systems for labeling or certification are needed. This helps in identifying and verifying the authenticity and integrity of IoT devices, making it easier for users to trust and rely on them.

A noteworthy observation is the increasing importance of zero-trust capability in IoT devices. This means that every single device must have built-in security measures that continuously verify and authenticate network connections. By adopting a zero-trust approach, the IoT ecosystem can provide a higher level of security, protecting sensitive data and preventing unauthorized access.

Furthermore, IoT devices and the data they produce can make a significant contribution to carbon neutrality and decarbonization efforts. These devices, along with the concept of digital twins, enable better monitoring and management of resources, leading to more sustainable practices and reduced environmental impact.

Additionally, internet security is a crucial element that should be considered in the IoT ecosystem. It should be end-to-end, starting with individual users taking responsibility for protecting their network. Traceability and interoperability play a vital role in ensuring secure internet operation, and efforts are being made worldwide, including in Japan, to provide users with traceability features.

In conclusion, the future use of IoT devices is expected to evolve beyond their original purposes. These devices have the potential to transform industries, improve efficiency, and enable innovative applications. However, realizing the full potential of IoT requires addressing critical areas such as data quality, device security, and internet security. By doing so, we can create a more reliable, secure, and sustainable IoT ecosystem.

Jonathan Cave

The Internet of Things (IoT) is described as a complex adaptive system that produces things that are yet to be imagined. This system consists of connected devices that work together to create complex functions, even though these functions may not have well-defined or objectively defined definitions. The IoT has the potential to revolutionize various industries and aspects of our lives through its interconnectedness.

However, privacy concerns arise when it comes to the IoT. These devices have the ability to collect vast amounts of personal and private information from their users, regardless of whether it is relevant to their nominal functioning or design. The collection of such data raises questions about the privacy of data, devices, and their functions within the IoT context.

Another aspect to consider is the impact of IoT devices on human behavior. For instance, when people use smart speakers, they begin to trust them to deliver content, thereby giving these devices a power they did not originally have. This trust implies that IoT devices are not just sensors but also actuators, with the ability to reprogram their users’ behavior, understanding, and attention.

The interaction between individuals and IoT devices also calls for a reshaping of ethical frameworks. As the operation of these devices and systems changes people’s behavior, understanding, and attention, there is a need to align our ethical frameworks with the evolving nature of individual and collective psychology in relation to IoT devices.

Additionally, the concept of data ownership is being reconsidered in the context of the IoT. It becomes necessary to resurrect the notion of data ownership so that people can be held responsible for their actions and the functioning of these systems. This is crucial in maintaining accountability and ensuring that individuals take ownership of their data and its usage within the IoT ecosystem.

Furthermore, ethical reflection, consideration, and control are fundamental when it comes to IoT devices. The ethical implications of these devices should be thoroughly assessed and addressed, with due consideration given to the potential consequences on individuals and society as a whole. This involves scrutinizing IoT projects for their ethical considerations and the application of legal mechanisms to make control measures more predictable.

Overall, keeping the conversation open on ethical considerations and control issues is of utmost importance. The emergence of new problems within the IoT ecosystem requires a collaborative approach, as no single party can perceive and address all the challenges alone. Simply ticking the ethical box at the beginning of a project and leaving it to lawyers is not enough. Ongoing ethical reflection and open discussions are essential to ensure that the ethical implications of IoT devices are adequately addressed and controlled.

Sarah T. Kiden

In the realm of the Internet of Things (IoT), power imbalances exist, calling for accountability and responsibility measures. These imbalances may arise during the design or research phase. Concerns are raised about the lack of consumer influence on future IoT deployments, leading to a need for empowering consumers.

To address these issues, collecting user stories on the harms caused by IoT devices can guide the creation of design guidelines and influence policy changes. Organizations like the Algorithmic Justice League, Data & Society, and Amnesty International have begun documenting AI harms, providing evidence to sway policymakers in the right direction.

Overall, the analysis highlights the presence of power asymmetries in the IoT ecosystem and underscores the importance of accountability and responsibility measures. Empowering consumers and involving them in shaping the future of IoT deployments is crucial. Furthermore, gathering user stories and documenting the harms caused by IoT devices can serve as valuable evidence for influencing policy changes and creating design guidelines. This comprehensive summary emphasizes the significance of addressing power imbalances and promoting responsible practices in the IoT industry.

Avri Doria

During the session, it was mentioned that no questions had been received online thus far. However, the speaker kindly invited participants to submit any questions through the chat or QA function. The audience was asked to keep their questions brief since only 15 minutes remained in the session due to the amount of content covered in the first part.

This demonstrates the speaker’s willingness to engage with attendees and provide valuable insights. Despite the lack of questions at that point in the session, it emphasized the importance of participant engagement to enhance the overall learning experience.

In conclusion, the speaker encouraged participation by inviting individuals to submit their questions through the chat or QA function. This call for engagement highlighted the significance of participant interaction in shaping the session and allowing for a more enriching learning experience.

Maarten Botterman

The Internet of Things (IoT) is a global technology that offers new opportunities to address challenges and is adapted and developed globally. It has the potential to revolutionize society by improving efficiency, decision-making, and connectivity through device communication and data exchange. The IoT is seen as a necessary technology with positive sentiment.

The argument for the IoT is that it can ethically address societal challenges by deploying systems in disaster-stricken regions and rural areas. It requires the involvement of all stakeholders and acknowledges the varying challenges across different regions. Sustainability and inclusivity are emphasized, with a focus on creating accountable ecosystems.

However, the adoption of the IoT also presents challenges such as new risks and the potential weaponization of technology. Legal clarity and regulation are necessary for IoT investment and development, and procurement practices can improve security. It is important to take proactive measures and implement self-certification and DNS for enhanced security.

Different networks and the use of DNS for interoperability and scalability are considered. AI also comes with risks, but the potential benefits justify them. Informed consent, labeling, and change management are emphasized to inform people about risks and adapt to the fast pace of change in the IoT space.

In conclusion, the IoT has the potential to address challenges ethically and create sustainable ecosystems. Legal clarity, regulation, and proactive measures are needed to address risks. Different networks and DNS can improve interoperability and scalability. Informed consent, labeling, and change management are important considerations for successful implementation.

Speakers

&

’Alejandro

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Avri

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Barry

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Dan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Elaine

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Hiroshi

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Jonathan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Maarten

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Mark

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Sandoche

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Sarah

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Vint

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Wout

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more