C h a p t e r 2
While ensuring security in embedded devices is
already a significant challenge, another layer of
difficulty is added with connected products.
Generally, connected products can be defined
as embedded devices connected to a network
infrastructure, either wirelessly or via a wire, to
communicate with other devices on a network.
Recent years have seen a significant trend toward
adding connectivity to devices for applications
like the Internet of Things (IoT), where devices can
exchange data in real time.
TRUSTED
OPERATIONS
FOR CONNECTED
PRODUCTS
Trusted operations refer to the security
practices and measures for ensuring the
reliable and secure operation of connected
devices, including establishing secure
connections between devices and systems,
using robust and secure communication
protocols, and implementing measures
to deliver software and firmware updates
securely and to prevent unauthorized
access."
Mehmet Akif Eker
Senior Hardware Security Engineer, Lucid Motors
10
Embedded Security: Keeping Edge Data Safe