The evolution of embedded devices: Addressing complex design challenges
Phil Burr, Arm
embedded.com (September 18, 2018)
Embedded devices used to be relatively straightforward to design before the Internet of Things. The designer of an appliance, industrial controller or environmental sensor only needed to interface the input signals, process with a microcontroller and provide output control. Systems were standalone; and other than reverse engineering, there was no incentive for a hacker to access a system.
With the introduction of the smartphone, we now expect our devices to be smart, upgradable and accessible over the Internet. Security is not optional – if security is not taken seriously, data, brand reputation and revenue streams will all be affected. Also, embedded systems are becoming more complex and you can’t be an expert in everything! Fortunately, you can use existing standards and stack libraries to get a project completed in a timely, secure way.
This article outlines the key design challenges an embedded developer faces today, and some of the new technologies that will help designers address these challenges.
To read the full article, click here
Related Semiconductor IP
- USB 4.0 V2 PHY - 4TX/2RX, TSMC N3P , North/South Poly Orientation
- FH-OFDM Modem
- NFC wireless interface supporting ISO14443 A and B with EEPROM on SMIC 180nm
- PQC CRYSTALS core for accelerating NIST FIPS 202 FIPS 203 and FIPS 204
- UCIe Controller baseline for Streaming Protocols for ASIL B Compliant, AEC-Q100 Grade 2
Related White Papers
- The realities of developing embedded neural networks
- The Future of Embedded FPGAs - eFPGA: The Proof is in the Tape Out
- MIPI in next generation of AI IoT devices at the edge
- How Low Can You Go? Pushing the Limits of Transistors - Deep Low Voltage Enablement of Embedded Memories and Logic Libraries to Achieve Extreme Low Power
Latest White Papers
- FastPath: A Hybrid Approach for Efficient Hardware Security Verification
- Automotive IP-Cores: Evolution and Future Perspectives
- TROJAN-GUARD: Hardware Trojans Detection Using GNN in RTL Designs
- How a Standardized Approach Can Accelerate Development of Safety and Security in Automotive Imaging Systems
- SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models