Securing the Internet of Things

The Internet of Things (IoT) is promised to a great future and already the achievements of the IoT are emerging around us.The challenge for developers is to track changes that are proposed on digital devices which are sold, regardless of the type of software realization to which they belong, whether in industry, in the cloud or in Ethernet systems.

The Heartbleed virus that struck a linked OpenSSL installation performed in OpenSource is a recent example of the need to remain vigilant about writing and coding software available to developers. Embedded systems are widely used in many applications because they have the advantage to be generally designed to be updated remotely.The downside is that users rarely create or manage these updates or corrections themselves. Sellers have an incentive to ensure that their products are safe and do not contain any error (or bug). But can we find something that is truly free of error and is completely secure? And dramas resemble to meteorite falls. They may occur after a long period of quiet life.

In contrast, however, it is possible to launch an attack detection on a trial basis. We note that unfortunately sometimes the driver forgets its content (it erases the encryption keys) if attacked repeatedly.Secure systems have a well trusted root TPM (TrustedPlatform Module). TMP is an option on many motherboards for opening secure service startup. The problem is that the TPM is outside the main processor that is supposed to protect. This is why many secure platforms integrate security processors on the chip, so as to prevent the ostensible piracy (physical and electrical) of the machine. Secure processors are used in smart cards, and this technology has become increasingly common, and is also found inthe automotive industry.

The security processors have an important role at the start of the session connexion, but they may also be used during the time of operation of the system. And hardware encryption system can be faster than the server, and in this case, the server can offload some of its tasks. The security processor may also be involved in secure transactions with remote sites and perform actions such as secure authentication before an update is applied to the entire system. It can also provide secure storage of keys used fordigital rights management(DRM).

Secure processors should not be confused with the cryptographic coprocessors, as C29x from Freescale. These coprocessors are designed in order to increase the flow of secure traffic network or the secure storage flow. They provide accelerators data flow faster than a conventional processor could do. This type of functionality is sometimes integrated into a server, or into special devices. With this approach, a conventional server can be used as a security device since this is one of the characteristics of the system, and not its primary goal.

Technology networking is evolving to serve companies, network operators and the IoT. The requirements for quality of service, security, and synchronisation are the major components of change in order to meet user requirements. See also

© 2015 Strategies Telecoms & Multimedia | Contact |  -