No Safety without Security on the IoT
We have reached the stage in the evolution of the Internet of Things (IoT) where two independent processes have become self-sustaining. The first—the creative process—has begun to uncover genuinely compelling applications. Beyond $40 internet lightbulbs, in-refrigerator Webcams, and toothbrushes with smartphone apps, systems developers are starting to see—and to prototype—applications at the convergence of smart sensing, cloud-based analytics, and distributed control. These applications promise unprecedented returns for their users.
But at the same time a second process—a more skeptical one—is gathering momentum. In this process, hackers, security experts, and safety engineers are watching with growing alarm as control systems with the potential to do great harm are drawn out across connected hubs, the Internet, and public clouds, creating an enormous attack surface. Exploits that can seize control of cars, incinerate houses, or bypass the safety interlocks of nuclear reactors can in theory be staged against any vulnerable link in these newly distributed systems.
To read the full article, click here
Related Semiconductor IP
- Video Tracking FPGA IP core for Xilinx and Altera
- Video Tracking FPGA IP core for Xilinx and Altera
- Video Tracking FPGA IP core for Xilinx and Altera
- NAND flash Controller using Altera PHY Lite
- Aurora-like 64b/66b @14Gbps for ALTERA Devices
Related White Papers
- A Survey on SoC Security Verification Methods at the Pre-silicon Stage
- The Answer to Non-Volatile Memory Security Issues at Advanced Nodes: Go Volatile!
- Safety & security architecture for automotive ICs
- 5 Steps to Securing the IoT
Latest White Papers
- Reimagining AI Infrastructure: The Power of Converged Back-end Networks
- 40G UCIe IP Advantages for AI Applications
- Recent progress in spin-orbit torque magnetic random-access memory
- What is JESD204C? A quick glance at the standard
- Open-Source Design of Heterogeneous SoCs for AI Acceleration: the PULP Platform Experience