5 Steps to Securing the IoT
Hagai Bar-El, Sansa Security
EETimes (3/25/2015 07:00 AM EDT)
A handful of simple principles can help engineers build more secure designs targeting the Internet of Things (IoT).
If you believe the research numbers coming from IDC and Gartner and the news coming out of this year's CES on IoT, you’d think they'd found life on Mars. But if the IoT is to live up to its lofty expectations, such as the ability of multiple device types from different manufacturers to safely communicate with each other, engineers need to step away from the Rover’s controls and focus on how we can make these devices more secure.
Here are five steps engineers can take to help the IoT reach its full potential.
To read the full article, click here
Related Semiconductor IP
- Quantum Safe, ISO 21434 Automotive-grade Programmable Hardware Security Module
- Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
- Embedded Hardware Security Module for Automotive and Advanced Applications
- Hardware Security Module
- ECC Secure Accelerator - High-performance ECC IP with advanced physical security
Related Articles
- 5 Steps to Confront the Talent Shortage With IP-Centric Design
- Paving the way for the next generation of audio codec for True Wireless Stereo (TWS) applications - PART 5 : Cutting time to market in a safe and timely manner
- Steps for Delivering Multimedia Over 5 GHz WLANs
- Securing IoT Devices With ARM TrustZone
Latest Articles
- Vorion: A RISC-V GPU with Hardware-Accelerated 3D Gaussian Rendering and Training
- Fragmentation to Standardization: Evaluating RISC-V’s Path Across Data Centers, Automotive, and Security
- SynapticCore-X: A Modular Neural Processing Architecture for Low-Cost FPGA Acceleration
- Uncertainty-Guided Live Measurement Sequencing for Fast SAR ADC Linearity Testing
- Pushing the Memory Bandwidth Wall with CXL-enabled Idle I/O Bandwidth Harvesting