Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 21 of 32

22 Then, we used encryption algorithms on the hidden data. With those two levels of protection, no attacker can easily tamper with the data." Protecting transmitted data involves using encryption algorithms and device handshaking to verify that data packets are correctly transmitted and received. Kulkarni also notes the importance of a secure component supply chain in ensuring the security of the IoT devices you build. That process begins with selecting a vendor. For many devices, this may mean selecting components from multiple vendors, which is why it's necessary to work through a trusted distributor that can help source reliable vendors. The typical supplier agreement is a contract in which you are agreeing to purchase a certain number of parts over a certain period of time. Kulkarni stresses the importance of confidentiality in these agreements. "You need to ensure that a particular chip and your name will not be disclosed to any competitor." This approach applies to third-party relationships as well, including research and development teams and manufacturers, which need to include IP protections as well as tracking and auditing mechanisms to ensure component quality. Kulkarni emphasizes the importance of this, saying, "You will sign nondisclosure agreements with them that include IP policies governing what happens in the case of an IP breach. With manufacturers, create a three-party agreement among you, the manufacturer, and the manufacturer's supplier. As the original equipment manufacturer, you must have ultimate authority to control the supply chain at a minute level." " A significant challenge for engineers is maintaining their intellectual property after their product enters the public domain." 22

Articles in this issue

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy