Connect Your Embedded System: from Sensor to Cloud
With a variety of wireless solutions, sensors and eXtreme Low Power microcontrollers, Microchip products enable end-to-end solutions that help you successfully connect your embedded system to the cloud and take advantage of all of the benefits of doing so. The Internet of Things takes advantages of Cloud Connected Embedded Systems. Cloud-Connected Embedded Systems can be found in products all around you. Products such as wearable fitness monitors, home security systems, home automation systems, garage door openers, industrial controls and many more.
A Cloud-Connected Embedded System connects either directly or indirectly to the internet and utilizes cloud-computing resources.
- Remote command and control
- Remote diagnostics and field re-programmability
- Remote data storage and processing
- Profile and status
- Push notifications
- Order fulfillment
- Consumer insight and advertising
Watch this webinar to learn more about how Microchip is enabling the connected home; click here to access.
IoT Security : Zero Touch Secure Provisioning solution
Since the IoT security paradigm is somewhat of a moving target—with multiple device types communicating with each other over a multitude of wired and wireless interfaces—IoT developers are relying on the expertise of chip suppliers that have years of experience in crypto hardware and security standards like TPM and Secure Hash Algorithm (SHA) and Elliptical Curve Cryptography (ECC). Microchip not only offers a range of security co-processors that are compatible with any MPU or MCU, but also powerful development tools to help you implement security co-processors in other words crypto-companion ICs more quickly into your embedded systems.
Primarily targeting cost-sensitive embedded applications, the ATSHA204A crypto element is based on SHA-based symmetric authentication and uses 4.5K bytes EEPROM. The ATAES132A crypto element, based on the Advanced Encryption Standard (AES), boasts 32K bytes of secure serial EEPROM to facilitate faster symmetric authentication.
The "Zero Touch Secure Provisioning Kit for AWS IoT” enables the mutual authentication security model from AWS. The kit uses the ATECC508A crypto engine uses Elliptic Curve Cryptography (ECC) to create secure, hardware-based key storage for IoT applications that include home automation, industrial networking and medical. It employs protected key storage as well as hardware acceleration of ECC cipher suites, including Elliptic Curve Digital Signature Algorithm (ECDSA) and key agreement with Elliptic Curve Diffie-Hellman (ECDH) techniques. It also ensures secure storage by utilizing the Hardware-TLS (HW-TLS) platform. The ATECC508A supports the CryptoAuth Xplained Pro evaluation and development kit and works with the CryptoAuthLib software support library. Proving that hardware-based security solutions do not need to be costly, the ATECC508A minimizes IT labor costs and licensing fees and is offered at very attractive prices for high-volume IoT applications. The user now have a true end to end secured solution from device to cloud.
To learn more about protecting devices and data from tampering or attack; check out the Avnet Hardware Hacker webinar series
The Critical Need for Device Security in the Intern
Protecting your data and devices begins with encryption. This process ensures privacy, authenticity and security in communication. This overview provides you with the information you need to understand the various device-level encryption options.