Secure Hardware for IoT Applications
Abstract
Internet of Things (IoT) technology aims to consolidate people, data, and things together to fulfill the needs of our everyday lives. The market of IoT applications is expected to grow rapidly due to significant increase in the number of smart devices and smart wearables in areas including eHealthcare, smart grids, smart cities, cars and industry 4.0. Implementation of IoT applications into the real environment is not only a technically complicated solution, but also is very complicated in terms of security.Security is a key-point requirement to deliver secure and safe IoT services from the connected devices to the cloud. On the one hand, methods and techniques to provide high-secure IoT infrastructures are mandatory. On the other hand, embedded hardware security is a major key-point because it can deliver significant benefits at the device level such as robust, tamper-resistant storage of keys, integrated cryptographic primitives, secure communication between devices, protection against both virtual and physical attacks, authorization and authentication between the devices and many other.
Internet of Things (IoT) technology aims to consolidate people, data, and things together to fulfill the needs of our everyday lives. The market of IoT applications is expected to grow rapidly due to significant increase in the number of smart devices and smart wearables in areas including eHealthcare, smart grids, smart cities, cars and industry 4.0. Implementation of IoT applications into the real environment is not only a technically complicated solution, but also is very complicated in terms of security.Security is a key-point requirement to deliver secure and safe IoT services from the connected devices to the cloud. On the one hand, methods and techniques to provide high-secure IoT infrastructures are mandatory. On the other hand, embedded hardware security is a major key-point because it can deliver significant benefits at the device level such as robust, tamper-resistant storage of keys, integrated cryptographic primitives, secure communication between devices, protection against both virtual and physical attacks, authorization and authentication between the devices and many other.