Security demands hardware improvements
Chris O'Reilly, Broadcom
EDN (April 04, 2014)
Fast, reliable network connectivity is at the heart of business today – powering critical infrastructure systems, internal business operations, customer-facing communications and home-based entertainment services. But it’s not only system performance that keeps network managers awake at night. As more people embrace multiple connected devices through a wide range of applications, security vulnerabilities are top-of-mind for both network managers and network hardware designers. As the type and scope of network traffic continues to evolve, so does the complexity of security threats. It is more important than ever to address greater levels of security at all points within these complex and varied network environments.
Critical infrastructure networks (such as financial transactions and power plants) clearly require increased protection. But even ‘lower level’ networks must take greater care to protect personal information that may become exposed during everyday transactions. Emerging network platforms in the cloud, home gateways, and mobile enterprise have opened additional avenues for threats against data security and system performance.
Even the simple process of uploading a photo to the cloud – much less using it to transmit enterprise data – requires the image to be secure at the device level, in the cloud, and at all points between as it traverses the network itself.
As security threats continue to evolve and network providers vie for customers interested in high-performance, seamless security at every point within the network, innovation at the silicon level is critical. High performance security features – integrated into silicon hardware – allow network managers to more thoroughly and more intelligently inspect, encrypt, authenticate and secure Internet traffic at wire speeds.
To read the full article, click here
Related Semiconductor IP
- Ultra-Secure, PQC-first, Root-of-Trust Security Platform
- Quantum Safe, ISO 21434 Automotive-grade Programmable Hardware Security Module
- Embedded Hardware Security Module (Root of Trust) - Automotive Grade ISO 26262 ASIL-B
- Embedded Hardware Security Module for Automotive and Advanced Applications
- Hardware Security Module
Related White Papers
- Hardware Security Requirements for Embedded Encryption Key Storage
- Open-source hardware for embedded security
- Run by Chips, Secured with Chips - Hardware Security with NeoPUF solutions
- IoT security: hardware vs software
Latest White Papers
- Enabling Space-Grade AI/ML with RISC-V: A Fully European Stack for Autonomous Missions
- CANDoSA: A Hardware Performance Counter-Based Intrusion Detection System for DoS Attacks on Automotive CAN bus
- How Next-Gen Chips Are Unlocking RISC-V’s Customization Advantage
- Efficient Hardware-Assisted Heap Memory Safety for Embedded RISC-V Systems
- Automatically Retargeting Hardware and Code Generation for RISC-V Custom Instructions