Issue link: https://resources.mouser.com/i/1442760
To define a holistic security approach, the self-certification working group has developed a trust framework for self regulation that focuses on the device in the scope of the ecosystem and the different touchpoints. Learn more about the framework and the IoTSF by reading my article, "Want consumer trust? Secure your IoT design." Simplify Security with Embedded Security Integrated Circuits Even though technology alone isn't enough to solve the security problem, it's still an essential component in protecting designs from security breaches. Between software- and hardware-based security methodologies, hardware-based approaches have proven to be the most robust. Establishing a "root of trust" using a secure microcontroller that executes software from an internal, immutable memory can guard against attempts to breach an electronic device's hardware. Since the executed software is stored in the microcontroller's read-only memory (ROM), it's considered to be inherently trusted because it can't be modified. That's why it's called the root of trust. Security managers, secure microcontrollers, and secure authenticators are examples of embedded security integrated circuits (ICs) that can help simplify the process of protecting entire systems. For example, Maxim's DeepCover ® portfolio of embedded security solutions provides advanced physical security to safeguard critical data and keys. Maxim also offers reference designs that ease the design process. For example, the MAXREFDES155 IoT embedded security reference design (Figure 1) can be used to authenticate and control a sensing node using elliptic curve-based public key cryptography with control and notification from a web server. The MAXREFDES155 reference design features an Arm ® Mbed ™ shield and attached sensor endpoint; the shield contains a DS2476 DeepCover ECDSA/SHA-2 co-processor. The sensor endpoint contains a DS28C36 DeepCover ECDSA/SHA-2 authenticator. Because the design is so simple, it can be quickly integrated into any star-topology IoT network. Tapping into a holistic design methodology and integrating embedded security ICs into your IoT design can give your customers the confidence that their data is protected. 8 | 8 | Figure 1: Maxim MAXREFDES155 DeepCover Embedded Security Reference Design is built to authenticate and control a sensing node using elliptic curve-based public key cryptography with control and notification from a web server. (Source: Maxim Integrated) DeepCover ® Embedded Security Solution Guide Featuring ChipDNA ™ Physically Unclonable Function Technology Our world is getting more connected every day. However, the Internet of Things (IoT) revolution will only be successful if users can trust connected objects and the underlying infrastructure. In the past, security was a concern only for dedicated applications such as electronic payment systems. Today, security has become a requirement in many additional applications such as smart grid, process control, and building automation. At the same time, malicious hackers have become more sophisticated, collaborating through online communities and building advanced attack scenarios to infiltrate IoT devices. Consequently, designers of electronic devices face new challenges. Not only must they implement very robust security against sophisticated attacks, they must also optimize their research and development efforts while keeping bill of materials (BOM) costs low. This is where Maxim's security expertise excels. Learn More: mouser.com/deepcover-embedded-security-solutions Using the MAXREFDES155 Protecting the Internet of Things. s V I D E O