Security vs. Innovation

Carnegie Mellon's exploration of new Internet of Things technologies pairs innovation with security research.

technology abstract

Last month, Carnegie Mellon University announced it would lead an expedition to explore new technologies for the Internet of Things (IoT). The Google-funded venture will "saturate the CMU campus with sensors and infrastructure, recruit students and other campus members to create and use novel IoT apps, and eventually expand these efforts to the wider Pittsburgh community," according to a university statement.

The project is geared toward innovation and openness, encouraging the deployment of IoT sensors across the campus and allowing anyone to participate in their use. "An early milestone will include the development of our IoT appstore, where any campus member and the larger research community will be able to develop and share an IoT script, action, multiple-sensor feed, or application easily and widely," said Anind Dey, lead investigator of the expedition and director of CMU's Human-Computer Interaction Institute. For example, researchers have already created an app called Snap2It, which allows users to connect to a printer or projector by taking a photo of it with their smartphone, and Impromptu, which accesses apps as needed for a particular location (such as a public transit app when the user is at a bus stop).

The flip side of all that innovation is the need to manage security and privacy. A second team of CMU researchers will develop "personalized privacy assistants," technology that will "help users configure the many privacy settings necessary to ensure that they retain adequate control over their data," said Norman Sadeh, a professor of computer science at CMU.  

But will that be enough? "Smart" IoT devices are notoriously dumb when it comes to security. In a recent conversation with me about cybersecurity issues in higher ed, a CISO from a major university recalled nixing a proposal for a networked vending machine because it processed credit card transactions yet did not have adequate security tech in place. The device may have seemed innovative to students, but could not stand up to PCI compliance requirements. Overall, a lack of standardized security protocols and the sheer variety of devices and sensitive data make for a complicated IoT security landscape — one the average user is ill-equipped to navigate.   

Users' lack of awareness about cybersecurity issues is a perennial problem that goes beyond the Internet of Things, as discussed in this month's feature, "Data Security in Higher Ed: A Moving Target." Not only are universities a tempting target — with "huge repositories of monetizable data," as CDW Director of Security Solutions Sadik Al-Abdulla noted — but faculty, staff and students often fail to realize that the information they have access to may be sensitive.

"People don't think a class roster is sensitive data, but it can be," Jessica States, information security officer at Fort Hays State University, told us. "They look at a list and think that nobody cares about all these names and addresses, but I look at it and think, 'Oh no!'"

With a campus full of IoT sensors and a heck of a lot of data flying around, CMU's security researchers certainly have their work cut out for them.

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • interconnected glowing nodes and circuits in blue and green, forming a neural network on a dark background with a futuristic design

    Tech Giants Launch $100 Billion AI Infrastructure Network Project

    OpenAI, SoftBank, and Oracle have unveiled a new venture, Stargate, through which they aim to build a massive AI infrastructure network across the United States. The initiative, which was announced at the White House with President Donald Trump, has been described as the "largest AI infrastructure project in history."

  • futuristic brain made of glowing circuits with a human hand reaching toward it

    Cloud Security Alliance Calls for Rethinking AI Development in the Face of DeepSeek Debut

    The Cloud Security Alliance (CSA) has weighed in on DeepSeek AI’s disruptive debut, warning that the revolutionary AI model is “rewriting the rules” of AI development. The remarks come as cloud security firm Wiz disclosed a major data leak in DeepSeek’s platform, raising concerns about security vulnerabilities in the cutting-edge system.

  • university building surrounded by icons for AI, checklists, and data governance

    Improving AI Governance for Stronger University Compliance and Innovation

    AI can generate valuable insights for higher education institutions and it can be used to enhance the teaching process itself. The caveat is that this can only be achieved when universities adopt a strategic and proactive set of data and process management policies for their use of AI.

  • three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

    Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.