Latest from IoT

Dreamstime_Ahmadrizal7373_336311969
dreamstime_ahmadrizal7373_336311969_promo
Future of Memory and Storage
promo__fms_2025__fmsnew
Security_Comp_Web_ThinkstockPhotos-639242220.jpg

Securing Unprotected Devices is Essential in the IoT Age (.PDF Download)

Dec. 5, 2019
Securing Unprotected Devices is Essential in the IoT Age (.PDF)

As the Internet of Things (IoT) becomes more mainstream, every device—sensors, actuators, embedded microcontrollers, or smart appliances—needs to be protected from hacking, data breaches, and other security vulnerabilities. In particular, security is always a concern when deploying cloud services because it necessitates storing and using secret keys in the microcontroller—which, if unprotected, can expose them.

One way to hack an IoT device is to physically attack the embedded system and spoof the private key, which may be located in the clear of a microcontroller memory. If the private key is spoofed, the device can be impersonated by an unauthorized user who can then control the device’s transactions. Once accessed, a scalable remote attack could be launched, leveraging corrupted IoT devices as entry points.