Page 50 - EE|Times Europe Magazine - December 2020
P. 50

50 EE|Times EUROPE

        Protecting the Endpoint in IIoT: A Snapshot of Chip-Level Security


          Infineon Technologies’ portfolio of security controllers to protect the   from supply chain to device onboarding — through in-field updates
        integrity and authenticity of embedded devices and systems includes   and always-on firmware monitoring.
        the OPTIGA TPM family. The OPTIGA TPM SLM 9670 is a quality-   In October 2019, Micron introduced the Authenta key management
        hardened trusted platform module for use in industrial applications   service (KMS) platform to enable a cloud-first deployment model for
        and based on a tamper-resistant secure microcontroller. As a turnkey   a broad set of industrial applications. The platform allows installed
        solution, it’s flashed with securely coded firmware according to the   Authenta-enabled devices to be switched on through a cloud-based
        latest Trusted Computing Group (TCG) Family 2.0 specifications. The   service, mitigating some of the challenges and complexities related to
        device is qualified according to the industrial JEDEC JESD 47 standard   securing devices in a connected environment.
        and is security-certified according to Common Criteria EAL4+.
          Developers can implement a complete automated certificate issuance   EMBEDDED SIM
        and management solution for the factory floor based on the OPTIGA   For applications such as remote condition monitoring, asset tracking,
        TPM for private key storage together with an identity management   and predictive monitoring, an industrial-grade embedded SIM (eSIM)
        solution from Sectigo.                                on the chip can be a good approach. ST’s GSMA-compliant ST4SIM —
                                                                                based on its ST33G secure MCU, featuring a
                                                                                tamper-proof Arm SecurCore SC300 processor
                                                                                and extra security features such as hardware
                                                                                cryptographic accelerators — provides one
                                                                                such solution in the form of both hardware
                                                                                and software.
                                                                                  This solution uses partners Akessa,
                                                                                Arm, and Truphone to provide and operate
                                                                                device-onboarding and service-provisioning
                                                                                platforms. The provisioning services enable
                                                                                IoT devices containing the eSIMs to connect
                                                                                automatically to cellular networks using flexi-
                                                                                ble lifetime subscription management. ST said
                                                                                its partners/operators can access hundreds of
                                                                                cellular networks of all types, including 2G,
                                                                                3G, 4G, low-power wide-area connectivity
                                                                                (LTE CAT-M), and narrowband IoT (NB-IoT),
                                                                                in large numbers of territories worldwide.
        Figure 2: A TPM supports key and life-cycle management with its unique endorsement   TALKING PUF SECURITY
        key and key hierarchies. The nonvolatile memory can be used to securely store sensitive   Another approach to device-level security is
        data such as certificates. It’s based on tamper-resistant hardware with security features   to exploit the silicon manufacturing process
        including sensors and memory-encryption capabilities for hardened protection of secrets.   itself to safeguard data, using the physi-
        (Source: Infineon Technologies)                                         cally unclonable function (PUF). Although
                                                                                silicon production processes are precise, this
                                                                                technology exploits the fact that there are
          In October 2019, Renesas Electronics Corp. introduced its RA family   still tiny variations in each circuit produced. The PUF uses these tiny
        of MCUs, targeting secure, scalable IoT. Based on an open-software   differences to generate a unique digital value that can be used as secret
        platform, the family enables customers to develop IoT endpoints by   keys, essential for digital security.
        working with a wide range of partners or by leveraging existing legacy   The PUF feature provides a digital fingerprint that can be a unique
        software platforms. The company stated at the time that many people   identifier for a chip and can serve other security purposes, including
        were not thinking about security. By integrating a strong RoT in   encryption, identification, authentication, and security key generation.
        hardware and making it an integral part of the MCU, Renesas worked to   With PUF, attempts to physically probe the key will drastically change
        make implementing security features a no-brainer: Customers would   the characteristics of that PUF circuit and thus produce a different
        not have to think about how to add security after completing a design.  number. The PUF key can be generated only when it is needed for a
                                                              cryptographic operation and can be instantly erased later. So, in theory,
        IN-MEMORY SECURITY                                    it provides the ultimate level of security.
        As systems increasingly rely on external NOR flash memory to protect   Earlier this year, both Silicon Labs and Maxim Integrated introduced
        code and data in connected systems, the need for added advanced    PUF-enabled security enhancements. Silicon Labs added new
        cryptographic security in memory is growing. As flash moves outside   hardware-based security for its wireless systems-on-chip for IoT
        of the host processor, several companies offer the ability to secure the   devices in its Wireless Gecko Series 2 platform, combining security
        flash itself — because it can no longer be embedded within the MCU   software features with PUF hardware technology. Maxim Integrated
        — to offer design engineers more versatility. For example, Infineon   introduced the MAX32520 ChipDNA Secure Arm Cortex-M4 micro-
        recently introduced its Semper Secure as an addition to its Semper   controller, which similarly incorporates PUF for multiple levels of
        NOR flash memory platform.                            protection. The MCU’s ChipDNA-generated key can be used directly for
          Micron, meanwhile, has its Authenta, a proprietary technology    functions such as symmetric secret keys to encrypt/decrypt data stored
        that combines NOR flash with a system-level, hardware RoT.    in the nonvolatile memory of the secure IC.
        Security features built natively into the flash enable advanced   One startup in this space that wants to use the quantum tunneling
        system-level protection with silicon RoT, without the need to add   properties during silicon manufacture to allow devices to have multiple
        new hardware components. The technology features strong, built-in   secure “unforgeable” identities in IoT systems is Crypto Quantique. Its
        cryptographic identity to simplify secure device management —    quantum-driven secure chip (QDSC), the company said, enables devices

        DECEMBER 2020 | www.eetimes.eu
   45   46   47   48   49   50   51   52   53   54   55