The Internet-of-Things (IoT) technology is promising to connect billions of objects, devices and machines to application servers via the Internet, revolutionizing industrial processes, enabling many new consumer applications - provided that security is not left behind. In the past 15 years, enterprise Information Technology (IT) architects have successfully upgraded their security schemes from an all-wired-stationary desktop world to all-wireless-mobile laptop and smartphone fleets without compromising on security and even improving it.
A similar evolution is happening now when beyond laptops and smartphones, industries are looking into connecting many devices, machines and objects to application servers through private and public networks.
Often closer to Intranet-of-Things than to true Internet-of-Things, these industrial deployments are focusing on keeping full control of the flow, storage and processing of data produced by their own devices without opening or trading them to the outside world. In such schemes, the main challenge of expanding a good security coverage to these devices is to design security schemes complying with both Information Technology (IT) and embedded hardware standards:
These security schemes are expected to widespread further in the industry and in the consumer world yielding end-to-end device-to-applicative server security, even simplifying device provisioning to services thanks to elaborate secure transactions over any kind of connectivity.
This is exactly what Avnet Silica, together with our partners and suppliers are investing into, providing full security reference-designs encompassing:
- Secure elements with customizable security protocols
- Embedded stacks using the secure elements
- Server code talking to the secure elements
- Secure personalization services for making each secure element unique
Whitepaper: IoT security - real problems and solutions
This paper aims at defining the real issues behind “IoT security”, the real challenges for our customers both from hardware and embedded / server software aspects and of course solutions as we envision them for the next 6 to 8 years, until our world becomes all IPv6 and 6LoWPAN.
Register to download the Security Whitepaper.