Ensuring Security in the Connected Home
Update: Synopsys Expands Security Solutions with Acquisition of Elliptic Technologies (June 29, 2015)
Ogi Brkic, VP of Marketing & Business Development at Elliptic Technologies
ECNmag (05/11/2015)
Security plays a critical role in the market adoption of the IoT. It's easy to imagine a scenario in which an intruder uses a connected appliance to gain control of someone's smart home or access to their personal information. Whatever the application, security must be addressed from the initial design and remain the core component of the system. This is essential in the deployment of these devices and the promise behind the intelligent connected home.
Secure enablement for the IoT made easy with a Root of Trust
In the intelligent connected home, routers, home gateways, and other IoT hubs will represent critical components of the home IoT ecosystem. It is likely that multiple IoT hubs will be present in many homes, and hubs take on many forms. Some of these will be specialized for particular applications, others for particular wireless or broadband protocols. Hubs may take the form of a traditional router with or without integrated broadband technology, a cablevision, satellite TV or IPTV set-top box, or a common home appliance. It is likely that, as is common now, a single gateway will connect the home to an external broadband or wireless network, and will also act as aggregation and control points for end point devices connected through the short range wireless standards mentioned above. The home gateway will in some cases be responsible for securely communicating data to and from the cloud, enabling premium services such as streamed 4K content, and may occasionally be responsible for securely updating other connected IoT devices such as appliances, sensors and alarm systems. Today, the majority of hundreds of millions of home routers are using rudimentary software based security. Almost a year after the OpenSSL Heartbleed bug was discovered, according to the Cisco Annual Security 2015 Report, 56 percent of devices indexed by Cisco use versions of OpenSSL more than 50 months old. We cannot rely on consumers to protect themselves and ensure that software patches are up to date.
Security must be invisible to them and it should just work. So then, how can these hubs be trusted?
E-mail This Article | Printer-Friendly Page |
|
Related Articles
- Let's make RISC-V connected systems synonymous with security
- Designing for safety and security in a connected system
- CANsec: Security for the Third Generation of the CAN Bus
- Ensure Cybersecurity in the Connected Vehicles Era With ISO/SAE 21434
- AI-driven SRAM demand needs integrated repair and security
New Articles
- Quantum Readiness Considerations for Suppliers and Manufacturers
- A Rad Hard ASIC Design Approach: Triple Modular Redundancy (TMR)
- Early Interactive Short Isolation for Faster SoC Verification
- The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification
- Advanced Packaging and Chiplets Can Be for Everyone
Most Popular
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- UPF Constraint coding for SoC - A Case Study
- Dynamic Memory Allocation and Fragmentation in C and C++
- Enhancing VLSI Design Efficiency: Tackling Congestion and Shorts with Practical Approaches and PnR Tool (ICC2)