Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
New White Paper: Protecting the IoT with Invisible Keys
Request Your Free White Paper Now:

"New White Paper: Protecting the IoT with Invisible Keys"

Rooting Trust in Silicon

With more than 10 billion devices connected to the Internet of Things (IoT), the need for strong security solutions cannot be understated. Security in IoT, or in any given situation, starts with trust. This white paper addresses IoT security by looking at the most fundamental assets of a connected device that need to be established: the keys and identities that that are essential to protect data and authenticate devices to the network and each other. These assets are at the heart of any security architecture especially for IoT where it is estimated that by 2025, there will be 152,200 devices connecting to the internet per minute. In this white paper we look at the challenges when generating and protecting secret keys such as the root key. In addition to traditional methods, a method based on static random-access memory (SRAM) physical unclonable functions (PUFs) is examined. We will show how trust in the IoT can be established with invisible keys rooted in silicon.


Offered Free by: Embedded Computing Design
See All Resources from: Embedded Computing Design

Recommended for Professionals Like You:

Thank you

This download should complete shortly. If the resource doesn't automatically download, please, click here.

Thank you

This download should complete shortly. If the resource doesn't automatically download, please, click here.

Thank you

This download should complete shortly. If the resource doesn't automatically download, please, click here.

Thank you

This download should complete shortly. If the resource doesn't automatically download, please, click here.