Building the right security foundation for connected devices

Display portlet menu

Building the right security foundation for connected devices

Display portlet menu

Building the right security foundation for connected devices

Smart cars in a crossroad

Discover how to bring your next IoT solution to life with cutting-edge software and hardware from Avnet Silica and onsemi.

Strategies for making your product smarter

Connectivity is vital for most modern devices. It’s no longer just for computers, smartphones or tablets. Televisions, baby monitors, thermostats, medical devices, automobiles and even aircraft are all connected today.

The Internet of Things (IoT) market is expected to reach $11 trillion by 2025, according to McKinsey. With potential like that, it’s easy to see how your business could grow if you added IoT capabilities to your products.

With growing connectivity comes increased security concerns. What security risks await you, and how can you mitigate them?

Bring your IoT solutions to life with Avnet SILICA and ONSemi. Learn more here.

Security and reliability win in IoT

Connected devices need to establish proof of identity and origin in order to reliably determine appropriate data sharing and control with other devices and service providers — a process defined as authentication.

Authentication is a key aspect of security that ensures robust access to trusted agents and easy identification of suspicious activity. With product-level authentication, clones and suspicious agents aren’t validated so network and device access are denied. This is especially critical in applications for automotive, industrial, healthcare and aviation, where human and environmental safety are paramount.

With any connected device, serious security planning must be factored into the early stages of the design process. Waiting until the end of the design process risks project schedule delays, drives up costs and creates unforeseen vulnerabilities in device security. Well-planned security delivers strong value by helping the device function properly from the start, avoid potentially expensive litigation and the detrimental effects to a company’s brand image caused by hacking.

Secure programming vs. secure provisioning: the right solution

What are the best ways to protect devices and software from intellectual property (IP) theft, cloning and malicious system hacking?

Two primary solutions are associated with device security: secure programming and secure provisioning. Which option is best for your application? While both solutions provide security solutions, you’ll find key differences.

Secure programming

First, secure programming requires all data to be generated/obtained outside the device itself, increasing the opportunity for that data to be compromised. Except for certain field programmable gate arrays (FPGAs) and multiprocessor system on a chip (MPSoC), secure programming provides security through software that resides on the device. This can protect firmware on the device but does not provide adequate protection from some cyberattacks like counterfeiting and overbuilding.

Software defects and bugs in programming are vulnerabilities continuously exploited by hackers. Once software-based security is compromised, system recovery becomes nearly impossible.

Secure programming is suitable for low-level applications that don’t require advanced security, or in cases where a malfunction won’t cause injury or harm to a person or property. It’s also suitable for devices specifically designed to provide security without requiring bidirectional communication with the programming system. Secure programming doesn’t rely on additional hardware, which delivers some cost savings at the expense of more robust security.

Secure provisioning

Secure provisioning employs added hardware in providing the best security protection for the complete lifecycle of the device. While the additional hardware will come at a financial cost, the prices are often very reasonable and can save a company expensive litigation and brand damage resulting from hacking.

Secure provisioning also delivers firmware protection and prevents overbuilding, counterfeiting and protects against software programming vulnerabilities. By having the root of trust anchored to hardware, device software and operations are protected. Hardware-based security also protects against unauthorized code reading and is more resilient to physical attacks. Secure provisioning provides critical protection in devices that, if compromised, could cause harm to a person, property damage, loss of sensitive data or intellectual property.

By partnering with trusted global technology partners like Avnet Silica and ON Semiconductor, valuable resources can be better focused on intellectual property innovation and other areas that deliver a strong competitive edge. We support you through design optimizations that both accelerate your time to market and differentiate your product offering. Ultimately, a partnership with Avnet Silica can improve business outcomes and customer journeys by providing the safe and reliable operation of advanced connected devices.

By partnering with trusted global technology partners like Avnet Silica and ON Semiconductor, valuable resources can be better focused on intellectual property innovation and other areas that deliver a strong competitive edge. We support you through design optimizations that both accelerate your time to market and differentiate your product offering. Ultimately, a partnership with Avnet Silica can improve business outcomes and customer journeys by providing the safe and reliable operation of advanced connected devices.

 

Learn more 

Follow Avnet Silica on LinkedIn

Building the right security foundation for connected devices

Display portlet menu

Building the right security foundation for connected devices

Display portlet menu
Related Articles
STM32 MCU Series
Transformative IoT solutions with the STM32 32-bit Wireless MCU Series
June 1, 2023
Choosing the right microcontroller for your project is crucial. In this post, we’ll explore the capabilities of ST’s 32-bit wireless MCU, STM32WBA52 and the IoT applications that benefit most from them.
factory showing IoT data on screens above the machines
When edge and enterprise collide
By Philip Ling   -   March 9, 2023
See the building blocks of a connected world at Embedded World 2023

Building the right security foundation for connected devices

Display portlet menu
Related Events
How to use a GreenPAK in your application
Date: July 4, 2024
Location: Germany, Stuttgart
City at night
How to Quickly Connect STM32U5 Discovery Kit to the Cloud
Date: January 25, 2024
Location: online, on-demand