Securing IoT Devices can be Never-Ending
By Ron Wilson, Intel FPGA
“Mommy, Daddy … Why is the sky blue?”
As you scramble for an answer that lies somewhere between a discussion of refraction in gasses and “Oh, look—a doggie!” you already know the response to whatever you say will be a horrifyingly sincere
“But why?”
And so on, until your patience lies in tatters at your feet. If you can capture that feeling, welcome to the world of Internet of Things (IoT) security, where no measure is ever quite enough, and no answer is ever unqualified. Just as with a child’s question—which could be idle chatter or the awakening of scientific curiosity—it will ultimately be up to you—the system designer—to say when enough is enough. And just as with that leading question, much will depend on what is actually at stake.
What is at Risk
Securing an IoT device can become, as we shall see shortly, a nearly infinite regression at nearly infinite cost. But as ARM* IoT Services group vice president Ian Ferguson observed at the recent IoT Device Security Summit, most IoT devices have cost targets far below near-infinity.
Related Semiconductor IP
- AES GCM IP Core
- High Speed Ethernet Quad 10G to 100G PCS
- High Speed Ethernet Gen-2 Quad 100G PCS IP
- High Speed Ethernet 4/2/1-Lane 100G PCS
- High Speed Ethernet 2/4/8-Lane 200G/400G PCS
Related White Papers
- Securing IoT Devices With ARM TrustZone
- Securing UART communication interface in embedded IoT devices
- Securing the IoT: Part 1 - Public key cryptography
- Securing the IoT: Part 2 - Secure boot as root of trust
Latest White Papers
- New Realities Demand a New Approach to System Verification and Validation
- How silicon and circuit optimizations help FPGAs offer lower size, power and cost in video bridging applications
- Sustainable Hardware Specialization
- PCIe IP With Enhanced Security For The Automotive Market
- Top 5 Reasons why CPU is the Best Processor for AI Inference