Focus on IoT security hardware: new areas of authentication

The boundary between cyberspace and real life is gradually blurred. With the development of the Internet of Things, individuals and various types of devices are increasingly connected to the network, and various items are seamlessly integrated into the information network system. Machines and robots can sense and analyze data to enable real-time remote control. The Internet of Things will change the way people live, work and even communicate. In the long run, no company can avoid its influence. However, the huge opportunities bring new challenges, especially in terms of security.

Security is at the heart of the Internet of Things, especially in terms of identity. If people need to connect their homes, cars and factories to the network, they must be safe. Individuals, machines, and devices must be securely authenticated and only authorized to access them. Users' private data and corporate secrets must be protected from theft and fraud. At the same time, IoT security design must also be easy to use without sacrificing any user experience. Therefore, security needs to be designed from the beginning to the IoT system, rather than being added later.

The importance of security hardware to the Internet of Things

Stuxnet, BlackEnergy, and a series of other recent attacks have proven that relying on software alone cannot effectively protect IoT systems. Blackmail hackers can often bypass security software and remotely control the system. Combining software with hardware provides the best balance between security and flexibility. Even if the security software does not work, the security chip can still provide protection.

User identity in the Internet of Things

IoT users require remote access to information on their devices, but this also requires a high degree of ease of use and security. User name and password verification often fail to meet these requirements because people often think that password entry is cumbersome and easy to steal. Recently, the FIDO (Fast Network Authentication) Alliance has released an open, extensible, interoperable multi-factor authentication mechanism standard.

IoT users can get two benefits from FIDO. First, their security has improved. Second, the complexity of device verification management has been greatly reduced. As shown in Figure 1, FIDO allows users to obtain their network account through a local hardware security verification code, which they can use to verify other systems, whether or not they have a PIN.

Device identity in the Internet of Things

With the rise of the Internet of Things, device security, especially device identity, is becoming more and more important. IoT devices control critical systems such as cars, factory systems, door locks, and security cameras. At the same time, they are also threatened by many networks. To block unprivileged participants and provide security, IoT devices must be able to authenticate in both directions with users, other devices, and the cloud. Fortunately, device identity technologies (such as IEEE 802.1AR) are very mature and widely used.

Password authentication is the best way to authenticate IoT devices. IoT devices can be built, maintained, and used with long keys. Therefore, there is no need to use a password for device authentication at all. Security hardware protects these keys from theft.

Some security chips—for example, the Trusted Platform Module (TPM), which is an open standard—not only establish device identities, but also design encryption and device detection. The integrity of the monitoring system is especially important for the Internet of Things, because illegal devices that obtain certain certifications can cause real physical damage.

Identity in the Industrial Internet

Industrial Internet refers to the application of the concept and technology of the Internet of Things in industry. For example, a new generation of manufacturing uses a network to integrate the entire supply chain from supplier to consumer, enabling suppliers to tailor production to market needs. In such an environment, authentication must be performed and end-to-end communication protected to ensure the security of all information, including consumers and suppliers.

To ensure the safety and integrity of the system, the safety controller can be integrated into all parts of the industrial Internet system, tracking everything from product reservations to production lines to transportation, distribution, wholesale and retail through devices such as customers' tablets. These security chips establish products, devices, and user identities for encryption and authorization while maintaining device uniformity. In addition, these security solutions provide protection for sensitive IP and process technologies.

in conclusion

In the Industrial Internet, reliable identity authentication for users and devices is essential. Without a reliable identity, an attacker can cross the boundaries of the network and reality. Such an attack is currently taking place. With the application of many IoT technologies, the impact of these attacks is not limited to smart homes or connected cars, but also extends to industrial automation, healthcare and other fields.

Fortunately, standards and technologies for reliable authentication are now available without compromising the user experience. Hardware security must be used to limit the impact of shortcomings that software cannot eradicate. Reliable identities and secure hardware are a must-have in designing IoT systems and other systems that connect cyberspace to the real world, and that's the only way to be secure.

Figure 1: Reliable authentication in FIDO (picture from FIDO Alliance)

Reliable authentication in FIDO

Figure 2: End-to-end security in the Industrial Internet

End-to-end security in the industrial Internet

-------------------------------------------------- --------

This article is selected from the "Intelligent Hardware Special Issue" in April. More technical hot texts can be downloaded from the special issue page !

Intelligent hardware special issue

Durable PITAKA MagCase For iPhone 6Plus Or 6S Plus make from 100% Aramid Fiber,which it was the same material used in body armor, spacecraft, jet engines, and Formula 1 Race cars.To profect your iPhone at safety condition in daily life.


Description:

1. 100% Brand new high quality Aramid Fiber, extremely durable!

2. Precision molded cases to perfectly fit your phone
3. Resist dirt, stains and is anti-static and anti-slip
4. Washable material for easy cleaning   
5. Protect your phone when in bumping.

6. Direct access to all ports and buttons without removing it from the case.                                                           

Color:black/silver/pink/blue/green/red/gold/purple etc 

MagCase For iPhone 6Plus Or 6S Plus

iPhone 6Plus PITAKA Magcase,iPhone 6Plus PITAKA Magcase Aramid Fiber,iPhone 6Plus Phone Case,iPhone6S Plus Magcase 100% Aramid Fiber,iPhone6S Plus Magcase,Durable iPhone6S Plus Magcase

Shenzhen Aokal Technology Co., Ltd. , https://www.aokal.com