Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 31 of 32

32 32 can send a deactivate command to protect a device from a newly identified malicious attack, or a server can deactivate a device if an end user fails to pay a subscription fee, or a device can deactivate itself if it comes under attack. A device moves back to "Activation state" only after successful execution of an activation command that contains an activation code cyphered by a Super Admin key. There must also be a mechanism for server-side deactivation, which is typically performed by secure messaging between the factory IoT server and the device. Singh notes that one challenge in designing secure IoT devices in today's market is the lack of standardized security protocols for those devices. This issue is becoming increasingly acute because of the rapid growth in the number of connected devices. However, industry initiatives are under way to address this issue. Singh notes as an example a technology called IoT SAFE from the GSMA. "They are putting the secure crypto algorithm inside the device," he says. "It will work as a secure element, and it will also work for connectivity. The SIM would play a dual role." "A connected coffee machine may not need the same level of security as a connected device in an automobile. The level of security you apply depends on the use case."

Articles in this issue

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy