Page 14 - 23_EETE_03
P. 14

14 EE|Times EUROPE



         EMBEDDED WORLD 2023: SECURITY FOCUS
        IoT Security: What’s Driving the


        Software-to-Hardware Shift?


        By Majeed Ahmad

                he hardware choices for embedded security are growing dynamically as   Semiconductors. “Counterfeit protection is a
                the push for more secure IoT devices and applications shifts the security   strong driver to defend the originality of the
                                                                                products, as this can only be accomplished
                implementation focus from software to hardware. The secure hardware   through hardware.”
        T technologies targeted at the internet of things include secure elements,   In this regard, he also mentioned connected
        hardware security modules (HSMs) and physically unclonable function (PUF)   devices—complex systems in which software
                                                                                operating at different layers of abstraction
        capabilities.                                                           executes over hardware.
          Shipments of secure hardware serving digital authentication and embedded   Hardware security includes numerous
                                                                                safety features and components: true
        security will reach 5.3 billion by 2024, doubling the number of shipments in 2019,
                                                                                random-number generation (TRNG), secure
        according to ABI Research. “Hardware-based security offers better protection   boot mechanisms, secure update, secure
        from manipulation and interference than its software-based counterpart because   debug, cryptographic acceleration, isolation of
                                                                                sensitive and critical functions with security
        it’s more difficult to alter or attack the physical device or data entry points,” said   subsystems, tamper resistance and protection
        Michela Menting, digital security research director at ABI Research.    of secrets, tamper detection, on-the-fly mem-
                                                                                ory encryption, process/functions isolation
          Attack scenarios against embedded systems   of an autonomous industrial robot or the   and runtime integrity protection.
        have increased in sophistication with increas-  navigation system of an autonomous vehicle   More importantly, the way security is
        ing computing power, according to Nuri   connected to the internet should be immedi-  implemented is fundamental, Noël noted.
        Dagdeviren, corporate vice president for the   ately apparent.          “Effective security solutions are the result
        security products business unit at Microchip                            of a strict development process with clearly
        Technology. “The range of defenses provided   ANATOMY OF HARDWARE SECURITY  defined design rules, multiple iterations of
        by the hardware and software implemen-  Hardware, which is more difficult to tamper   careful review and full control over the many
        tations differs significantly against these   with than software, serves as the foundation   sub-components involved in the design.”
        evolving attack scenarios, and more and more   of the complex systems that address security.   That’s why security certification is critical,
        applications justify the hardware implemen-  It’s the layer on top of which all other layers   he added. It provides design engineers with
        tations,” he said.                  are built and mounted: firmware, operating   an external proof point for the device’s level
          For example, the importance of build-  systems, connectivity libraries and applica-  of security and makes it easier to compare
        ing defenses against hacking an isolated   tion software.               security solutions.
        thermostat or a car radio may not be a   “This is the concept of the root of trust,”
        priority concern, Dagdeviren said, whereas   said Denis Noël, director of product mar-  SECURITY EMBEDDED INTO SoCs
        the importance of securing the integrity   keting for secure authentication at NXP   The key element of an information security
                                                                                implementation is strong encryption with
                                                                                a securely protected encryption key. Mod-
                                                                                ern microcontrollers, secure elements and
                                                                                integrated HSMs all provide strong encryption
                                                                                capabilities.
                                                                                  “Secure elements and HSMs provide the
                                                                                highest levels of protection for the encryp-
                                                                                tion keys,” Dagdeviren said. “PUF is a unique
                                                                                technique that overlays the key protection
                                                                                capability on MCUs via modest incremental
                                                                                implementation complexity.”
                                                                                  At the same time, security IP and
                                                                                subsystems are being integrated into system-
                                                                                on-chip designs. Many NXP processors today,
                                                                                including the company’s i.MX 9 applications
                                                                                processor series, come to market with inte-
                                                                                grated security subsystems.
                                                                                  As Noël noted, however, there are tradeoffs
                                                                                to integrating security directly in the pro-
                                                                                cessors. For example, an integrated secure
                                                                                subsystem will necessitate a large die.
        This diagram shows how a secure element facilitates hardware security for a wireless   “For some device types, these tradeoffs
        network. (Source: NXP Semiconductors)                                   are worthwhile, but for others, with a smaller

        MARCH 2023 | www.eetimes.eu
   9   10   11   12   13   14   15   16   17   18   19