The Role of Physical Security in IoT
Securing the Internet of Things (IoT) continues to become more important as the value of assets, and number of connected devices, continues to increase. The distributed and fragmented nature of IoT means a larger attack surface and physical access (proximity) to the devices. The combination of these two factors make physical security a viable and potent threat. There are many examples of how a lack of sufficient physical security can pose a severe security risk to the IoT ecosystem and the effects of a security breach can quickly snowball. For example, a system that uses fingerprint authentication for identity access. First the hacker overcomes authentication which provides access to personal data, access to credit card information and more, and once one device has been hacked, the hack is applied remotely enabling access to thousands of devices.
Arm has identified four types of vulnerability that should be considered when designing a system-on-chip (SoC); software, communication, lifecycle and physical. If one of these vulnerabilities isn't protected, the whole system becomes compromised, so it is important to ensure all necessary mitigation measures are considered and implemented at the very beginning. A range of counter-measures are recommended to ensure that all attack opportunities are mitigated.
To read the full article, click here
Related Semiconductor IP
- LPDDR6/5X/5 PHY V2 - Intel 18A-P
- ML-KEM Key Encapsulation & ML-DSA Digital Signature Engine
- MIPI SoundWire I3S Peripheral IP
- ML-DSA Digital Signature Engine
- P1619 / 802.1ae (MACSec) GCM/XTS/CBC-AES Core
Related Blogs
- Ensuring Integrity: The Role of SoC Security in Today's Digital World
- Imagination and Renesas Redefine the Role of the GPU in Next-Generation Vehicles
- The Role of GPU in AI: Tech Impact & Imagination Technologies
- Arm Ethos-U85: Addressing the High Performance Demands of IoT in the Age of AI
Latest Blogs
- Why What Where DIFI and the new version 1.3
- ML-DSA explained: Quantum-Safe digital Signatures for secure embedded Systems
- Efficiency Defines The Future Of Data Movement
- Why Standard-Cell Architecture Matters for Adaptable ASIC Designs
- ML-KEM explained: Quantum-safe Key Exchange for secure embedded Hardware