Intelligent Fusion: Enhancing Systems with IoT and AI Integration

 January 30, 2024

 

The fusion of AI and IoT is everything but trivial, because contemporary IoT is lacking robust security measures, cameras and sensors were exploited frequently by hackers, therefore decentralizing data centres by implementation of edge computers is increasing the risk of destructive cyber attacks. Hacking into today's installation is easy, too many vulnerabilities are well-know, others are discovered and not exploited, yet, waiting for D-Day (disruption day). There is no need for quantum hacking. The advent of AIoT, however, delivers a different dynamic. Adding computing power closer to the sensors requires firm observation and management of edge computers, development and swift implementation of self-defending smart network and each component with matching computational power. The more complexity we add, the more vulnerabilities will transform the current paths of hacking into broad highways. This can be reduced significantly by national and international cooperation of governments and companies, setting up laws and norms, sharing information and strategies confidentially, not publicly.

The rapid progress in quantum computing adds a – forgive me the pun – an unsymmetrical quantum leap in cyber attacks. Quantum networks are the only answer to quantum hacking, but establishing quantum networks is difficult. The 4000km quantum network realized by China, the quantum satellite “Mozi” launched in 2016 by China, the expended cooperation between China and Russia towards India to join the quantum network demonstrates the urgency of building quantum networks.

 

Officially, quantum computing is fighting with high error margins, but even our limited insight guided us to the conclusion that either hybrid attacks or pure quantum cyber attacks were carried out by China when breaking RSA encryption and two step authentication at the end of 2023.

 

Our collective observations and analysis suggest that the speculated Q-Day could have occurred in December 2023, as indicated publicly. However, the focus is not on the certainty of Q-Day's past or future happening. With the advent of quantum computing, the swift decryption of information becomes its foremost application, which immediately enforces post quantum hacking resilient encryption of sensitive data.


Building upon large IoT installations to create AIoT introduces a substantial increase in complexity. The infrastructure, in this scenario, may position a potential attacker advantageously, exploiting more vulnerabilities locally and gathering greater intelligence. Even without the emergence of quantum hacking, safeguarding extensive AIoT installations, like smart cities, becomes considerably more challenging, and in February 2024 we are far from defining the necessary countermeasures – realization is further down the time line – opening the field of attacking and sabotaging our societies on multiple levels, endangering stability and social order, electrical power supply and industrial production. With realization of AIoT and industry 5.0 cyber security must forge an alliance similar to NATO, however, making every NATO member automatically a member of that non military alliance might proof counterproductive.

 

CISCO Systems gave up on its initiate of industrial security as their CCNA industrial, although the right step and an imperative since industry 4.0, proved too demanding and therefore unpopular among IT specialists, which leaves until today industrial’s infrastructure vulnerable on the border to weakly guarded.

 

The introduction of quantum hacking attacks adds an enormous thread and could render most encryption obsolete within hours or days, providing cybercriminals with access to sensitive data for more sophisticated and deeper attacks.

 

The silver lining lies in international cooperation with trusted partners, reinforced by laws, regulations, and rules fortifying AIoT installations. Implementing multiple security layers in both software and hardware, incorporating pattern recognition, and mandating post-quantum computing secure encryption offer a promising avenue. This not only helps prevent damages but also significantly enhances our current cyber defense capabilities.

 

Traditionally, US American companies have set the standard in IT, including solutions of defense against cyber threads, and all over Europe governments, companies and institutions have happily relied on it. However, IT infrastructure as well as user habits vary from country to country, therefore forging an alliance - if applicable - with the U.S. government and U.S. companies could contribute to more safety as long as we have two security layers additionally, and those layers include software and hardware and pattern intelligence: one shielding umbrella based on EU structure, plus one additional layer by country. This triple security ought to ensure that at every level the differences are maximally secured, because cyber security is not about one size fits all, and every international interaction is fully secured as well.

Critical infrastructures, like the financial sector and power supply, demand top-level protection, necessitating the establishment of a quantum network. Our proposition to prioritize post-quantum computing safety in the most sensitive fields through the definition and implementation of industry 6.0 acknowledges the rapid progress in quantum computing. The technical challenges of cyber security upgrades are too immense for seamless integration into industry 5.0.

 

Our IT infrastructure is facing sophisticated hybrid attacks, providing without sturdy countermeasures access to more powerful devices, such as edge computers, enable more powerful attacks on the entire infrastructure, causing serious physical damage far beyond today’s scope of malicious cyber actions.

Only post quantum hacking resilient installations stand a chance to prevent remote attacks and damages on electrical energy providing infrastructure, such as power plants as well as wind farms or solar farms, disrupting bank transactions, trade on stock markets and similar institutions, not to mention, although it is a different network, serious disruptions in the field of everything under the department of defense.

 

Last, but not least, we assume that block chain currencies will be exploited by quantum computing cyber attacks, which is another topic, but also other block chain technologies. Notable is that Maersk Line terminated its use of block chain technology in logistics due to its high cost (and low acceptance).

 

A special focus is recommended on medical sensors in AIoT as to our current understanding most of those sensors will not be part of a quantum network for years to come. Targeted attacks in the medical sector could induce fear and social instability, making our societies vulnerable by harming the people in need of cure and care.

 

Delaying action on these necessities could result in havoc and damage on an unprecedented scale, both physically and financially. It is imperative that we address these challenges promptly and collaboratively to ensure the resilience of our AIoT ecosystems.