The Role of Hardware Root of Trust in Edge Devices
By Saumitra Jagdale, EETimes Europe (June 21, 2022)
The Fourth Industrial Revolution, or Industry 4.0, has sustainability and increased efficiency as its foundational tenets, and their existence is the result of the latest advancements in technology. One such advancement is the emergence of edge computing — computing that happens directly at the point of data collection, or at the “edge” of a network, as opposed to cloud computing, wherein the data is sent to a centralized server and then processed per the requirements.
Edge computing emerged as an answer to the growing demand for bandwidth created by data generated from internet-of-things devices. Moving the computing process to the edge allows service delivery to the end user with minimal latency compared with that of centralized processing, and it can help bring services and solutions to areas that lack sufficient network or grid connectivity. When integrated with other technologies that are characteristic of Industry 4.0, such as the IoT, edge computing can help deliver services and processes much faster and more efficiently.
Developments in SoC technology in tandem with hardware acceleration have enabled specialized processes to be performed remotely with increased efficiency of the SoC as a whole. The latest developments in chip manufacturing technologies have also made possible the realization of devices that consume power in the order of nanowatts. These devices, by the virtue of their very design, are used in applications in which they are most likely to be left unattended, giving potential intruders unsupervised and uninterrupted access to them. And because the computing happens where the data is collected, any breach in security can cause sensitive data to be jeopardized. Hence, developing relevant safety systems for edge computing becomes a critical factor in the industry of tomorrow.
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |
Related News
- Lattice Introduces New Secure Control FPGA Family with Advanced Crypto-Agility and Hardware Root of Trust
- Intrinsic ID Announces QuiddiKey 100 - Providing a Strong Root of Trust Solution for Internet Connected Devices
- Hardware Root of Trust: The Key to IoT Security in Smart Homes
- Hardware Root of Trust: The Key to IoT Security in Smart Homes
- PUFsecurity and eMemory Launch Next-Gen PUF-based Hardware Root of Trust IP for Future Computing
Breaking News
- JEDEC® and Industry Leaders Collaborate to Release JESD270-4 HBM4 Standard: Advancing Bandwidth, Efficiency, and Capacity for AI and HPC
- BrainChip Gives the Edge to Search and Rescue Operations
- ASML targeted in latest round of US tariffs
- Andes Technology Celebrates 20 Years with New Logo and Headquarters Expansion
- Creonic Unveils Bold Rebrand to Drive Innovation in Communication Technologies
Most Popular
- Cadence to Acquire Arm Artisan Foundation IP Business
- AMD Achieves First TSMC N2 Product Silicon Milestone
- Why Do Hyperscalers Design Their Own CPUs?
- Siemens to accelerate customer time to market with advanced silicon IP through new Alphawave Semi partnership
- New TSN-MACsec IP core for secure data transmission in 5G/6G communication networks