Page 20 - 23_EETE_03
P. 20

20 EE|Times EUROPE



         EMBEDDED WORLD 2023: SECURITY FOCUS
        Hardware Root of Trust: The Key to IoT Security


        in Smart Homes


        By Anne-Françoise Pelé

                  hen everything is connected,   secure. Intrinsic ID, a spinout of Royal Philips
                  everything is at risk. The   Electronics, has developed IP solutions based
                  proliferation of internet-of-  on physical unclonable functions (PUFs) to
        Wthings devices for smart homes     secure connected devices.
        has raised security and privacy concerns for
        their users. By implementing a hardware   SECURING TRUST
        root of trust, the authenticity, integrity and   With the explosion of connected IoT devices
        confidentiality of devices are enforced, and   per household, it has become critical to
        smart homes are protected against would-be   ensure data security and privacy preservation.
        attackers.                          Every device potentially represents an entry
                                            point for malicious intrusion, from the device
        Implementing a hardware             itself to the network it is connected to.
                                              A hardware root of trust is the foundation
        root of trust enforces the          for protecting smart-home endpoints and
        authenticity, integrity and         services. It establishes an anchor point for the
                                            chain of trust by creating a unique, immutable
        confidentiality of devices and      and unclonable identity to authorize a device   Intrinsic ID’s Pim Tuyls

        protects smart homes from           in the IoT network.
                                              For many years, PUFs have been deployed
        would-be attackers.                 as a hardware root of trust. A PUF is a physical   and scalable way, we extract the credentials
                                            structure from which a device-unique and
                                            unclonable cryptographic key is created. It   from the hardware of the chip itself,” Pim
          Security in IoT should never be an after-  leverages the deep-submicron variations that   Tuyls, CEO of Intrinsic ID, explained in an
        thought. Over the years, attacks have become   occur naturally during the chip-   interview with EE Times Europe. “Every chip
        more frequent, sophisticated, devious and   manufacturing process and gives each transis-  is physically different due to the process by
        targeted. From the voice assistant to the baby   tor slightly random electrical properties.  which it is made.
        monitor to the smart-heating system, billions   There are different ways to use a PUF to   “When a chip is made, silicon is doped to
        of smart-home devices are now vulnerable to   secure a device. Eindhoven, Netherlands–  make sure you get some electrical properties
        endpoint intrusions.                based Intrinsic ID has built a foundation of   in the transistors,” he added. “That doping
          To establish a foundation of trust, IoT   trust based on static random-access memory   cannot be 100% controlled, and the result is
        device makers need to get identities and   (SRAM) PUFs.                 that every transistor on the chip has a unique
        keys into their devices and keep these assets   “To build a root of trust in a very secure   threshold voltage.”































        Keeping secrets secret (Source: Intrinsic ID)

        MARCH 2023 | www.eetimes.eu
   15   16   17   18   19   20   21   22   23   24   25