Security continues to be paramount for any electronics-based design, and this is especially the case for IoT deployments where complexity, resource constraints and a high degree of connectivity exist. While much talked about, the approach to IoT security needs to rely on established security principles as well as careful consideration to the ever-changing threat landscape. In this white paper we investigate some of the IoT security challenges design engineers face when bringing their products to market. In particular, the paper highlights why a software approach to IoT security implementation can no longer meet acceptable levels of assurance and protection as well as sets out the reasons why a hardware-based approach is now considered an essential element of any IoT solution design and implementation. This paper also emphasizes the benefits of taking a more holistic approach to IoT security, embracing a new mindset beyond past practices.
Previous White Paper
Adding more cloud compute won’t solve the problem of managing exponentially growing quantities of data for ...
We also recommend:
Linux continues to be the leading choice for embedded device operating systems but the decision to choose Linux for use in a medical device setting includes the additional considerations of patient...
The developer’s journey toward a secure system starts right at the very beginning of the product development, well before one line of code is written. Security must become part of the developer’s...
How can you protect your data? Part 4 of Nuvation Engineering's article series discusses the many threats your device can be vulnerable to, and how to implement proper preventative measures in the...
IoT endpoints are a top target of cyberattacks. But centralized security architectures like PKI leave deployments susceptible to man-in-the-middle attacks. Blockchain at the edge could be the answer.
Tune in as IAR Systems’ Global FAE Manager Shawn Prestridge shows how to spin up a secure boot manager on an NXP LPC5500 series development board with Arm TrustZone in less than 10 minutes.
Stolen IP can be modified to include backdoors and side channels. The means modified Software IP can potentially enter safety-critical systems like a modern car. Here’s how to protect your connected..
Learn how to bake cybersecurity into can’t-fail edge devices in this educational video series with Wind River. The seven-part series compresses the entire security lifecycle into less than 30 minutes.
The Past, Present and Future of Cybersecurity in Embedded Systems explores how security requirements have changed from the early days of embedded systems. It examines how vulnerabilities have...
You need to be sure that the software you send to the plant is exactly the same as the software that gets installed into the manufactured products. No exceptions.
Why do less than four percent of IoT devices implement the security measures necessary to protect an organization's IP and customers from local or network-borne threats?
In this series of five webcasts, we’ll run through the five key security-related problems that will impact your design, and more importantly, how to solve them.
Secure contexts are a must in industrial platforms, especially if it’s a “connected” platform.
You’ve spent months or even years creating IP that belongs to your company and/or its customers. In many cases, that IP is what makes you stand out from your competitors.
According to industry analysts, we could see one trillion IoT connections by the year 2035, with the transfer of more than 2 Zbytes of data just from consumer devices alone.
This week on the Embedded Insiders, Brandon and Rich discuss an age-old controversy: What’s more secure? Proprietary or open-source software?
The Trusted Computing group (TCG) released its TPM 2.0 Library specification Revision 1.59.
The Ada language abstracts most direct interaction with memory onto compilers, transitioning things like memory checks from a manual human operation to automatic. Get ready to save tons of debug time.
Crystal Display Systems are helping to ensure security and safety as the world attempts to resume back to normal working life.
The number of crimes related to the unauthorized use of personal data on the Internet is increasing. Cybersecurity Ventures predicted that cybercrime will cost the world $6 trillion annually.