Acquired Electronics360

Information Technology

IoT Security: 5 Expert Perspectives

07 September 2015

Here are five quick takes on securing the Internet of Things (IoT) from Intel, BlackBerry, Wind River, Silicon Labs and CEVA Inc. Together, they cover everything from global network management to gateways to embedded systems, ICs and low-power semiconductor intellectual property (IP).

Gary Davis, chief consumer security evangelist, Intel SecurityGary Davis, chief consumer security evangelist, Intel SecuritySecurity is an issue all the way up the line; from a fitness device to a smart phone to the Internet (See Figure 1). The threats come at every stage, from endpoint to network, but Gary Davis of Intel espouses with a solid end-to-end platform, such as Intel’s IoT Platform that was launched in December of 2014.

Figure 1Figure 1

Key to the platform are the use of gateways and the Wind River Edge Management System (EMS). Among other features, it allows configuration of IoT devices, file transfers and data analysis and response. At the same time, Davis is a strong advocate of use-case analysis as users themselves can inadvertently introduce the biggest risks, such as downloading poor or malicious software.

Dave Kleidermacher, senior vice president, Head of Product Security at BlackBerry.Dave Kleidermacher, senior vice president, Head of Product Security at BlackBerry.From BlackBerry’s perspective, Dave Kleidermacher says it is very much about infrastructure and device management on a massive scale. BlackBerry has long been experts at this and therefore has the experience and platform to do it, though it is new to the IoT space.

Recruited recently by BlackBerry from Green Hills Software, known for its military-grade security, Kleidermacher believes that IoT requires an integrated platform solution for over-the-air upgrades and other device management tasks. “You have to manage it down to the gateway then it [the gateway] handles the devices. If you can’t manage it, it’s not going to be secure,” he says. “The mobile market has solved that problem, with a proven, reliable, worldwide data infrastructure.”

Skip Ashton , vice president of Software Engineering at Silicon Laboratories.Skip Ashton , vice president of Software Engineering at Silicon Laboratories.“From the IC perspective, what's interesting is that we spent all this time developing these devices and protocols, but no one spent time attacking them!” says Skip Ashton of Silicon Laboratories, referring to ICs. The reason, he says, is that it is easier to attack a phone, gateway or cloud interface, instead of an IC, “so I do not really have to attack your device; I can send perfectly legitimate messages because I hacked the other thing,” referring to a weaker link along the chain.

However, it is important to, “keep your side of the street clean.” So he suggests IC manufacturers to make sure they test for systematic weaknesses, such as debug ports that can be tapped using power swings or clock glitching, and from which tht code can be extracted.

Dr. Jakob Engblom, product line manager, Wind RiverDr. Jakob Engblom, product line manager, Wind RiverFrom an embedded systems point of view, “We’re putting stuff online that was never supposed to be online,” says Jakob Engblom, product line manager at Wind River (now Wind, by Intel). “It was created by people for whom security just wasn’t a concern.”

Engblom suggests making sure to, “only listen to the right things; you need to check authentication of message for integrity, then implement encryption for confidentiality.” However, “authentication and integrity are way more important.”

He adds that gateways should be protected from long-range attack by using robust firewalling, while Flash memory should not be readable by making sure debug ports—as well as serial lines—are not open.

Eran Briman, vice president of marketing, CEVA, Inc.Eran Briman, vice president of marketing, CEVA, Inc.Eran Briman, vice president of Marketing at CEVA Inc., looks at it from the end-node point of view, and suggests trying to limit the amount of information shared with the cloud.

“Instead of sending raw data, whether video streams from camera, or sensor data out of smart bracelet, you can process it locally on your IoT device and then send only pieces of information.” “In that way if there is a successful attack, only a limited amount of data is compromised. This also lowers power consumption,” he adds.

Questions or comments on this story? Contact the author of this article, email engineering360editors@ihs.com



Powered by CR4, the Engineering Community

Discussion – 0 comments

By posting a comment you confirm that you have read and accept our Posting Rules and Terms of Use.
Engineering Newsletter Signup
Get the Engineering360
Stay up to date on:
Features the top stories, latest news, charts, insights and more on the end-to-end electronics value chain.
Advertisement
Weekly Newsletter
Get news, research, and analysis
on the Electronics industry in your
inbox every week - for FREE
Sign up for our FREE eNewsletter
Advertisement

CALENDAR OF EVENTS

Date Event Location
30 Nov-01 Dec 2017 Helsinki, Finland
23-27 Apr 2018 Oklahoma City, Oklahoma
18-22 Jun 2018 Honolulu, Hawaii
Find Free Electronics Datasheets
Advertisement