Supplier eBooks

Analog Devices - Embedded Security: Keeping Edge Data Safe

Issue link: https://resources.mouser.com/i/1506851

Contents of this Issue

Navigation

Page 9 of 24

C h a p t e r 2 While ensuring security in embedded devices is already a significant challenge, another layer of difficulty is added with connected products. Generally, connected products can be defined as embedded devices connected to a network infrastructure, either wirelessly or via a wire, to communicate with other devices on a network. Recent years have seen a significant trend toward adding connectivity to devices for applications like the Internet of Things (IoT), where devices can exchange data in real time. TRUSTED OPERATIONS FOR CONNECTED PRODUCTS Trusted operations refer to the security practices and measures for ensuring the reliable and secure operation of connected devices, including establishing secure connections between devices and systems, using robust and secure communication protocols, and implementing measures to deliver software and firmware updates securely and to prevent unauthorized access." Mehmet Akif Eker Senior Hardware Security Engineer, Lucid Motors 10 Embedded Security: Keeping Edge Data Safe

Articles in this issue

Links on this page

view archives of Supplier eBooks - Analog Devices - Embedded Security: Keeping Edge Data Safe