Mw tag 60818e7ec9b34

Software Secures IoT Edge Devices

April 22, 2021
The proliferation of smart devices and IoT edge sensors gives hackers a myriad of backdoors into data centers. Implementing device-level security is more important than ever.

Most businesses, fearful of the hacks and ransomware attacks that have been in the news so often in recent years, have done what they can to safeguard their data centers from external threats. However, many have been slower in shoring up security for interconnected access points from edge devices, which leaves a back door open to malicious actors.

The proliferation of IoT devices in the marketplace means there are more vulnerable access points than ever. These “smart” devices, such as phones, thermostats, and autonomous vehicles, are endowed with interconnectivity to enable critical updates to firmware or functionality. While secure data centers may be thought to be safe from outside intrusion, IoT devices are often at risk of being exploited by those looking for an easier way into systems.

Device-level security needs to address all the technical, IP, supply chain, and business process challenges manufacturers face without having to become experts in cryptography and complex hardware security technologies themselves. In the absence of well-implemented IoT security, vendors risk damage to their products, credibility, and brand, as well as the loss of critical IP that is used to conduct complicated tasks that require some level of intelligent functionality with access to sensitive code or data sets.

One method of protecting edge devices is deployment of software solutions that can easily be utilized by IoT device OEMs to develop, manufacture, and maintain secure and trustworthy products. Such software enables OEMs to isolate and protect security credentials, preventing their devices from being compromised by implementing an end-to-end secure boot process. That process ensures that software on a device is identified, authenticated, and started up when the device is powered on. A secure boot also includes the protection of the firmware images stored in the non-volatile memory regardless of whether the device is powered on. This process requires several stages of authentication, protection, and encryption/decryption to ensure that the device is secure.

One such solution is Sequitur Labs’ EmSPARK Security Suite, which was designed for industries where embedded security is critical, such as industrial control, building automation, the smart home, machine vision, automotive communication, and medical devices. IoT hardware manufacturers use EmSPARK to implement device-level security by addressing all the technical, IP, supply chain, and business process challenges.

Sequitur’s EmSPARK Security Suite offers a robust security framework protecting embedded firmware, keys, and security-critical assets for many customers and thousands of partner products, solutions, and ecosystems in fields like smart mobility, efficient power management, IoT, and 5G.

Sponsored Recommendations

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!