Skip to main content
Lesson 1 of 5 5 min read

Why IoT Devices Need Their Own Network

Every smart home enthusiast reaches a pivotal moment: the network has grown from a single smart speaker to dozens of connected devices—cameras, thermostats, light bulbs, robot vacuums, smart plugs, door locks—and they all share the same Wi-Fi network as laptops, phones, and tablets that hold banking apps, medical records, and private photos. This lesson explains why that flat-network approach is dangerous and how isolating IoT devices onto their own network segment dramatically reduces risk.

The Unique Security Profile of IoT Devices

IoT devices differ from traditional computers in several ways that make them inherently less secure:

  • Infrequent firmware updates. Many IoT manufacturers ship a device and never release another patch. Even when updates exist, devices rarely auto-update and owners forget to check. A vulnerability discovered after sale may remain exploitable for the lifetime of the product.
  • Weak or hardcoded default credentials. A startling number of devices ship with factory-set usernames and passwords like admin/admin or root/root. Some embed credentials directly in firmware, making them impossible for the end user to change at all.
  • Minimal processing power. The low-cost microcontrollers inside a smart bulb or outlet lack the resources to run antivirus software, host-based firewalls, or encryption libraries. Security controls that are standard on a laptop simply cannot run on a $12 Wi-Fi plug.
  • Always-on connectivity. IoT devices are designed to be reachable 24/7. They listen on open ports, maintain persistent cloud connections, and often communicate using unencrypted or weakly encrypted protocols.
  • Long replacement cycles. People replace phones every two to three years, but a smart thermostat or light switch may stay on the wall for a decade, long after software support ends.

Real-World IoT Attacks

These are not theoretical risks. High-profile incidents have demonstrated exactly what happens when IoT devices are compromised:

The Mirai Botnet (2016)

In September and October 2016, a piece of malware called Mirai scanned the internet for IoT devices that still had factory-default credentials. It tried a list of 62 common username/password pairs—combinations like root/xc3511, admin/admin, and root/vizxv—over Telnet. Compromised devices included IP cameras, DVRs, and home routers. The resulting botnet enrolled hundreds of thousands of devices and launched some of the largest distributed denial-of-service (DDoS) attacks ever recorded, including a 1.2 Tbps assault on DNS provider Dyn that took down Twitter, Reddit, Netflix, and dozens of other major websites. The Mirai source code was later released publicly, spawning dozens of variants that continue to target IoT devices today.

Smart Camera Breaches

In 2019, a Ring camera in a child’s bedroom in Mississippi was accessed by an unauthorized individual who spoke to the child through the speaker. The attacker had used credential-stuffing—trying username/password combinations leaked from other breaches—to gain access. Similar incidents were reported with Wyze cameras in 2022 when a caching bug briefly allowed some users to see thumbnail images from other people’s cameras. These cases illustrate that even mainstream, well-funded manufacturers are not immune to security failures.

Lateral Movement: How One Compromised Device Threatens Everything

On a typical flat home network, every device can communicate freely with every other device. This means a compromised smart bulb becomes a potential launchpad for attacking your laptop. The attack chain works like this:

  1. Initial compromise. An attacker exploits a known vulnerability or default credential on an IoT device exposed to the internet, or the device’s cloud service is breached.
  2. Network reconnaissance. The compromised device scans the local subnet using ARP requests or simple port scans, discovering every other device on the network—your NAS, your work laptop, your spouse’s computer.
  3. Lateral movement. The attacker pivots from the IoT device to higher-value targets. They might exploit an unpatched SMB vulnerability on a Windows PC, intercept unencrypted traffic, or use the compromised device as a proxy for further attacks.
  4. Data exfiltration. With access to a real computer, the attacker can steal files, install ransomware, capture credentials, or establish persistent backdoor access.

This progression from a $10 smart plug to a full network compromise is called lateral movement, and it is one of the most common attack patterns in both enterprise and home networks.

Blast Radius Reduction Through Segmentation

Network segmentation is the practice of dividing a single network into smaller, isolated segments so that devices in one segment cannot freely communicate with devices in another. When applied to a smart home, it means placing IoT devices on a separate network segment from your trusted personal devices.

The concept of blast radius comes from incident response: when a breach occurs, how far can the damage spread? On a flat network, the blast radius is the entire network. With segmentation, a compromised smart bulb can only reach other devices on the IoT segment. It cannot scan, attack, or even see your laptops and phones on the trusted segment. The firewall between segments acts as a hard boundary.

This does not prevent the IoT device from being compromised, but it contains the damage. A breached bulb remains a breached bulb—not a gateway to your financial data.

Defense in Depth and Where VLANs Fit

Security professionals use a principle called defense in depth: rather than relying on a single security measure, you layer multiple controls so that the failure of any one layer does not result in a complete compromise. For a smart home, these layers might include:

  • Layer 1: Strong passwords and unique credentials on every device and account.
  • Layer 2: Firmware updates applied promptly when available.
  • Layer 3: Network segmentation (VLANs) to isolate device classes.
  • Layer 4: Firewall rules controlling what traffic can cross between segments.
  • Layer 5: DNS filtering to block known malicious domains.
  • Layer 6: Monitoring and logging to detect anomalous behavior.

VLANs are the mechanism that makes Layer 3 possible on a home network. A VLAN (Virtual Local Area Network) creates logically separate broadcast domains on the same physical network infrastructure. You do not need to run separate Ethernet cables or buy separate routers—a single managed switch and a VLAN-capable router can create the isolation you need.

Limitations: What VLANs Do Not Solve

It is critical to understand that VLANs are one layer, not a silver bullet. Segmentation does not help if:

  • You never change default passwords. If your IoT devices still use factory credentials and are accessible via their cloud services, an attacker does not need to be on the local network at all.
  • You ignore firmware updates. A vulnerable device is a vulnerable device regardless of which VLAN it sits on. If an attacker compromises the device through its cloud connection, the VLAN only limits lateral movement—the device itself is still compromised.
  • Unused services remain enabled. Devices with open Telnet ports, UPnP enabled, or unnecessary remote access features expose attack surface that VLANs cannot close. Always disable services you do not use.
  • Firewall rules are too permissive. A VLAN with a rule that allows all traffic to all other VLANs provides zero additional security. The value of segmentation depends entirely on the restrictiveness of the rules between segments.

Think of VLANs as the walls of a building: they define rooms and control movement between them, but they do not replace locks on doors (strong passwords), regular maintenance (firmware updates), or removing hazards from the rooms themselves (disabling unused services).

Summary

IoT devices present a unique combination of security challenges: they are always on, rarely updated, often use weak credentials, and lack the processing power for meaningful onboard security. On a flat home network, a single compromised device can serve as a stepping stone to your most sensitive personal data. Network segmentation through VLANs contains the blast radius of any breach by creating hard boundaries between device classes. However, VLANs work best as part of a defense-in-depth strategy that includes strong credentials, timely updates, disabled unused services, and properly configured firewall rules. In the next lesson, we will examine exactly what a VLAN is and how the 802.1Q standard makes segmentation possible on affordable home networking equipment.

Lesson Complete