IoT Security
Ron Wilson, Altera Corporation
May 29, 2014
Enthusiastic promotion for the Internet of Things (IoT) is rising like an all-pervading dawn over the electronics landscape. From home automation to transportation systems to telemedicine, the concept of connecting local devices—or even individual actuators and sensors—to the Internet is illuminating new wonderful possibilities. Manage your home from your smart phone? With the IoT it’s natural. Connect images, vital signs, and blood chemistry of an isolated rural patient to a diagnostic expert-system running on ten-thousand servers? With the IoT, it’s easy, they say. But some experts warn that a very dark cloud is spreading toward this glorious dawn. Unlimited connectivity, these designers caution, brings unlimited vulnerability. Yet security remains among the least-discussed topics in the public IoT furor. Early this month, a panel at the IoT Developers’ Conference sought to rebalance the discussion. Experts engaged in initial deployments of the network sought to explore deeper into the growing shadows of risk that mar the IoT dawn.
E-mail This Article | Printer-Friendly Page |
|
Intel FPGA Hot IP
Related Articles
- A comprehensive approach to enhancing IoT Security with Artificial Intelligence
- IoT Security: Exploring Risks and Countermeasures Across Industries
- How to achieve better IoT security in Wi-Fi modules
- How PUF-based RoT Can Solve IoT Security Issues
- Basics of SRAM PUF and how to deploy it for IoT security
New Articles
- Quantum Readiness Considerations for Suppliers and Manufacturers
- A Rad Hard ASIC Design Approach: Triple Modular Redundancy (TMR)
- Early Interactive Short Isolation for Faster SoC Verification
- The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification
- Advanced Packaging and Chiplets Can Be for Everyone
Most Popular
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- UPF Constraint coding for SoC - A Case Study
- Dynamic Memory Allocation and Fragmentation in C and C++
- Enhancing VLSI Design Efficiency: Tackling Congestion and Shorts with Practical Approaches and PnR Tool (ICC2)