Page 49 - EE Times Europe November 2021 final
P. 49

EE|Times EUROPE   49



            IoT & 5G
           Securing the IoT: Technical Approaches to

           Defend and Protect IoT Nodes


           By Don Loomis, Stephane di Vito, and Robert Muchsel, Maxim Integrated, now part of Analog Devices



                   en billion IoT nodes are connected today, 10× more than just a decade
                   ago, and the trend is continuing unabated. With this growth comes an
                   equal growth of opportunities for attackers. The estimated annual cost
           Tof cyberattacks ranges from tens of billions of dollars to more than
           a trillion dollars, and this number, too, keeps rising. Therefore, security con-
           siderations are now essential to continue the successful scaling of the IoT. IoT
           security begins with the security of the IoT nodes.
             No company wants to see its name in the same sentence as “breached, and
           customer data was stolen.” What’s more, connected devices are also subject
           to government regulations, such as FDA rules for medical devices, U.S./EU
           cybersecurity requirements for Industry 4.0 critical infrastructure, and several
           emerging standards for the automotive industry. Those requirements push for
           high-level security while not explicitly mandating the use of hardware-based
           security. However, IoT nodes are often large-volume, cost-optimized appliances,
           creating challenges to balance security and cost.

           CREATING SECURE NODES USING         is to ensure that the secret keys used for data   microcontrollers (i.e., E PROM or flash) are
                                                                                                   2
           A ROOT OF TRUST                     encryption or digital signatures are protected   not secure. An attacker can directly observe
           How can we design a cost-efficient yet secure   against disclosure.     the memory contents at a relatively modest
           IoT node? Creating a secure IoT node begins   The biggest challenge for root-of-trust   cost using scanning electron microscopy.
           with a root of trust (also known as a secure   security ICs is resistance against physical   The semiconductor industry has developed
           element), a small, affordable integrated cir-  attacks, such as direct probing and so-called   physically unclonable function (PUF) technol-
           cuit designed to offer security-related services   side-channel attacks.  ogy to mitigate this risk (Figure 2). The PUF is
           to the node (Figure 1). Examples of these                               used to derive a unique key from the intrinsic
           functions are data encryption for preserv-  PHYSICALLY UNCLONABLE FUNCTION  physical properties of the chip. Those prop-
           ing confidentiality and digital signatures to   Because direct probing attempts to observe   erties are far more difficult to probe directly,
           ensure authenticity and the integrity of infor-  the internals of microcircuits, memory tech-  making it impractical to extract the resulting
           mation. The ultimate goal of the root of trust   nologies typically used in general-purpose   key via direct probing. In some instances, the
                                                                                   PUF-derived key encrypts the rest of the inter-
                                                                                   nal memory of the root of trust and, therefore,
                                                                                   protects all other keys and credentials stored
                                                                                   on the device.
                                                                                     Side-channel attacks are even cheaper and
                                                                                   less intrusive. They leverage the fact that
                                                                                   electronic circuits tend to leak a signature of
                                                                                   the data they are manipulating, for exam-
                                                                                   ple, over the power supply, radio, or thermal
                                                                                   emissions. The subtle correlation between
                                                                                   measured signals and the processed data can
                                                                                   lead to successfully guessing the value of a
                                                                                   secret key after a moderately complex statis-
                                                                                   tical analysis when the circuit uses that key
                                                                                   (for example, to decrypt data). A root of trust
                                                                                   is explicitly designed to prevent such data
                                                                                   leakage using various countermeasures.

                                                                                   APPLICATION EXAMPLE USING          IMAGE: SHUTTERSTOCK
                                                                                   A SECURITY IC
           Figure 1: The “root of trust” concept ensures authenticity and integrity for security-   The benefits of a hardware-based root of trust
           related services. (Source: Analog Devices)                              become evident in the types of secure

                                                                                     www.eetimes.eu | NOVEMBER 2021
   44   45   46   47   48   49   50   51   52   53   54