Internet of things Security

IoT and Fighting Nigeria’s Security Challenges, by Zeenat Sambo

IoT and Fighting Nigeria’s Security Challenges, by Zeenat Sambo
Written by ga_dahmani
IoT and Fighting Nigeria’s Security Challenges, by Zeenat Sambo
surveillance robots

Over time, the use of IoT by developed nations has strengthened their security forces and protected their territories. In Nigeria, the use of IoT devices for security purposes, such as intrusion detection, webcams, and war machines with censors to automate their operation, has re-emphasized the need to recognize their legitimate use for cyber protection.

As Nigeria’s insecurity challenge continues to defy all measures put in place to reduce its spread, stakeholders should start looking at other alternatives that technology offers, one of which is the application of the Internet of Things (IoT). .

IoT is the network of billions of physical devices connected to the Internet and equally used to share data.

The integration of IoT into new technologies to combat security is expected to advance and equally revolutionize human technology operations in effective management of the communication program involved. This is to ensure that IoT is used in such a way that it does not pose any threat to national security when used to combat crime and insecurity.

In that regard, the Minister of Communications and Digital Economy, Mallam Isa Ibrahim Pantami, revealed that Nigeria’s telecom regulatory framework has since been designed to address the challenges that may arise with the advancement of IoT in the country.

The minister was speaking at twin events titled Stakeholder Consultative Forum on the Regulatory Roadmap for the IoT Ecosystem in Nigeria, hosted by the Nigerian Communications Commission (NCC). He pointed out that Nigeria, in the past two years, has shown efforts to curb cybercrime.

A recent report by the International Data Corporation (IDC) forecasts that by 2025 there will be 41.6 billion IoT connected devices, so smart homes and wearable devices are expected to grow rapidly.

Although the IoT has been around since the 1990s, recent technological advances have made it more practical. It enables access to affordable and reliable sensors, increases the availability of cloud computing platforms, and advances machine learning and artificial intelligence (AI) technologies.

There are so many varieties of IoT devices such as smartphones, medical devices, light bulbs, satellites, routers, refrigerators, smart TVs, smart video recorders, spy GPS and audio recording device trackers, security alarm systems, and body cameras. etc.

…IoMT refers to the IoT used for combat and war operations, such as surveillance robots and human-wearable biometrics for combat. Essentially, it is a network of interconnected entities that continually communicate with each other to coordinate, learn, and manage a wide range of activities in an informed and efficient manner.

IoT devices can range from simple home appliances to sophisticated industrial tools and military equipment. An example is a light bulb that can be turned on/off via a smartphone app, motion sensors or a smart thermostat in connected offices and streetlights. With unique identifiers for each IoT component (UID), it allows them to transmit data without human assistance.

TEXEM announcement

Over time, the use of IoT by developed nations has strengthened their security forces and protected their territories. In Nigeria, the use of IoT devices for security purposes, such as intrusion detection, webcams, and war machines with censors to automate their operation, has re-emphasized the need to recognize their legitimate use for cyber protection.

The ever-increasing security challenges besetting Nigeria are enough to require the use of the Internet of Military Things (IoMT) for national security.

These IoMTs refer to the IoT used for combat and war operations, such as surveillance robots and human-wearable biometrics for combat. Essentially, it is a network of interconnected entities that continually communicate with each other to coordinate, learn, and manage a wide range of activities in an informed and efficient manner.

Consequently, experts have opined that much of the IoMT concept is driven by the belief that future battles will likely take place in urban areas and will be dominated by artificial intelligence and cyber warfare.

Therefore, IoMTs are conceptually designed to offload much of the physical and mental burden combatants face during combat by creating a miniature ecosystem of intelligent technology capable of distilling sensory information and managing multiple tasks autonomously.

Some ICT tools to deal with insecurity are GSM, camera, satellite, radio, closed circuit television (CCTV), LTE cell phone (Long-Term Evolution), video surveillance cameras and other military devices for security measures.

In addition, the military often uses drones for reconnaissance, surveillance, and targeted attacks. With the new advancement of these technologies, it is clear that cybersecurity must be regulated to prevent the manipulation of IoT in the ecosystem.

…the National Information Technology Development Agency (NITDA) and other stakeholders should promote and support new companies that develop solutions to address insecurity in the country and also ensure the empowerment of security personnel with digital technology skills, to that can take advantage of emerging technologies to solve national problems. security challenges.

Recent weapons such as MH-6 Little Bird, Bradley Fighting Vehicle, M9 Armored Combat Earthmover, Bayraktar and TAI Aksungur used on the front lines, also have built-in sensors that enable human-machine communication and effective detection of combat targets.

Others include satellite and computer-based Public Safety Communications Systems (PSCS) and Public Safety Networks (PSN) systems, which are dedicated telecommunications networks used for communications by agencies such as the police, fire department, ambulance service and others.

As a result of the characteristics of the IoT ecosystem, malicious actors have manipulated the flow of information between networked devices over time. It is becoming increasingly difficult to protect important processes that were previously performed manually from malicious cyber activity.

The Nigerian military and paramilitary intelligence have tried over time to ensure that attack vectors are secretly investigated to prevent cyberattacks on their arsenals.

Remember that in order to safeguard the ICT sector in Nigeria, the Federal Government formulated the National Cyber ​​Security Strategy in 2014 to deal with threats, defend and support the openness of cyberspace, as well as balance security with respect to privacy and human rights. fundamental.

All in all, to prevent further security breaches, all security officers in Nigeria have a duty to adopt the use of IoT/IoMT equipment to combat insecurity across the country.

However, the National Agency for the Development of Information Technologies (NITDA) and other stakeholders should promote and support new companies that develop solutions to address insecurity in the country and also ensure the empowerment of security personnel with digital technology skills, so that they can take advantage of emerging technologies to solve national security challenges .

Zeenat Sambo writes from Abuja.


Support the integrity and credibility of PREMIUM TIMES journalism

Good journalism costs a lot of money. However, only good journalism can guarantee the possibility of a good society, a responsible democracy and a transparent government.

For continued free access to the best investigative journalism in the country, we ask that you consider making a modest support of this noble effort.

By contributing to PREMIUM TIMES, you’re helping keep journalism relevant and ensuring it remains free and available to everyone.

Donate



TEXT AD: Call Willie – +2348098788999






PT Mag campaign ad

About the author

ga_dahmani

Leave a Comment