You’re probably tired of hearing me say it, but it can’t be stressed enough—security must be paramount in your design, whether it’s a financial system, a medical device, or a home-automation product. Don’t get caught closing the barn door after the cows have left, or whatever that saying is.
In attempt to shut that barn door, so to speak, the Z-Wave Alliance has announced some new security requirements for any IoT devices that comply with its standard. Z-Wave is a communications protocol that allows all types of home-automation products to interact seamlessly. This could include anything from thermostats and garage door openers to lights, locks, and alarm systems.
The Alliance’s Board of Directors recently mandated that all devices receiving Z-Wave Certification after April of next year must include the latest Security 2 (S2) framework, what it deems as the industry’s strongest levels of IoT security. This affects mostly smart-home devices and controllers, gateways, and hubs.
The S2 framework was developed by the Alliance, but with the help of leading cybersecurity hacking experts. If followed correctly, S2 removes the risk of networked devices being hacked, in theory at least, in their communications between the devices and the cloud.
By using a QR or pin-code on the device itself, the devices are uniquely authenticated to the network as well. This should thwart common hacks. In addition, for further protection, Z-Wave strengthened its cloud communication protocol, enabling the tunnelling of all Z-Wave over IP (Z/IP) traffic through a secure TLS 1.1 tunnel.
- Dev Tools & OS
- Reference Designs
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Parts Search
Top tech to watch at CES 2017: Building blocks for autonomous drive
It's hard to believe, but once again it's time for the most exciting (and exhausting) show of the year - th...
Most Recent Articles
The Cavalry has arrived for automotive cybersecurity. What's next?
After the publication of Charlie Miller and Chris Valasek's remote commandeering of a Jeep's CAN bus brought national attention to the issue of automo...
Difficulties in calculating MTBF and reliability
Mean Time Between Failure (MTBF) is an important metric for determining the lifetime of embedded system components, but it’s difficult to calcul...
Design management system eliminates ASIC shortcut risk
Taking shortcuts can be a risky endeavor when designing an ASIC. However, there are avenues to streamlining a design project and reducing the risk whe...
Verifying vital designs
Device certification, software analysis, reduced power consumption are all ubiquitous issues in the embedded design industry. Here, Warren introduces...
Mechatronics aids in embedded system design
By looking at embedded systems from a different perspective, a mechatronics perspective, systems can be improved while saving cost. Over the last few...
Securing the edge with ARM TrustZone for v8-M
ARM's new 32-bit ARMv8-M architecture was introduced in 2015, adding TrustZone security extensions for Cortex-M microcontrollers (MCUs), among other f...
Signal- and power-integrity fundamentals are essential in a high-speed PCB
In today's digital design world, speed is often the main factor determining a product's performance. Many designs are packed with too many high-speed...
100 Gigabit Ethernet tackles backplanes and copper cables
The implementation of the IEEE 100 Gbps Backplane and Copper Cable Task Force precipitates the creation of specifications to increase signaling rates...
Embedded moves to multicore
Power savings and performance enhancement have multicore looking like an SFF "Mighty Mouse" for the embedded industry.
What's in your smart device?
For mobile devices, sub 1 W processors are the choice. For digital home devices, there are choices at 3 W and up. For tablets, something in between mi...
An introduction to FPGA power
Designing the power system for a field-programmable gate array (FPGA) is no easy task. FPGAs are highly configurable semiconductor devices that are us...
Analytics-driven embedded systems, part 2 - Developing analytics and prescriptive controls
In Part 1, we motivated the use of analytics within embedded systems using examples such as the BuildingIQ intelligent climate control system and the...
ARM vs x86: Is x86 dead?
The emergence and media domination of ARM technology could be a nail in the coffin for x86, but each has its own place and may continue to be useful i...
Verifying embedded designs with cloud computing
Many industries have recognized the value of cloud computing both in terms of cost reduction through shared resources, and new capability offered by t...
Encryption 101: Choosing the right scheme
This intro to encryption offers some of the pitfalls that can derail the inexperienced user. About six years ago, I started working with a UK crypto c...
Embedded virtualization enables scalability of real-time applications on multicore
Embedded virtualization combats the multicore complex: Global object networking allows real-time processor scalability.
Embedded Application Frameworks: Simplifying the development of M2M devices
A helping hand from Embedded Application Frameworks eases design pressures for M2M developers.
Encryption 301: More extensive encryption subsystems
Using Ethernet protocols requires the proper encryption schemes. In Part 1, we looked at some do's and don'ts on encryption. In Part 2, we introduced...
Choosing the best IoT protocol
While much of the IoT relies on the traditional embedded development skills, the requirement for always-on connectivity is tasking engineers to make d...
Let Snapdragon connect your legacy camera to the Open-Q