Latest from IoT

Dreamstime_Lightkeeper_49216720
security_dreamstime__lightkeeper__49216720_2
Dreamstime_Ahmadrizal7373_336311969
dreamstime_ahmadrizal7373_336311969_promo
Future of Memory and Storage
promo__fms_2025__fmsnew
ID 307212482 © Samvel Hakobyan | Dreamstime.com
dreamstime_a__samvel_hakobyan_307212482_2
Dreamstime_Studioclever_322492665
ai_dreamstime_a__studioclever_322492665
ID 316508515 © Alena Butusava - Dreamstime.com
Brainchip Platform Uses Spiking Neural Networks for Low Power Operations
Security_Comp_Web_ThinkstockPhotos-639242220.jpg

Securing Unprotected Devices is Essential in the IoT Age (.PDF Download)

Dec. 5, 2019
Securing Unprotected Devices is Essential in the IoT Age (.PDF)

As the Internet of Things (IoT) becomes more mainstream, every device—sensors, actuators, embedded microcontrollers, or smart appliances—needs to be protected from hacking, data breaches, and other security vulnerabilities. In particular, security is always a concern when deploying cloud services because it necessitates storing and using secret keys in the microcontroller—which, if unprotected, can expose them.

One way to hack an IoT device is to physically attack the embedded system and spoof the private key, which may be located in the clear of a microcontroller memory. If the private key is spoofed, the device can be impersonated by an unauthorized user who can then control the device’s transactions. Once accessed, a scalable remote attack could be launched, leveraging corrupted IoT devices as entry points.