Last update on .

Integrating security into IoT projects is no easy feat. However, it is an increasingly urgent necessity. With an installed base of 44 billion connected devices projected for 2023, the amount of data and information generated and shared will reach zettabytes of data, according to our data and forecasts.

Highly Sensitive. Highly Vulnerable.

Much of the data flowing across the IoT will be sensitive, whether about an individual’s privacy or confidential business information. As such, it presents a lucrative opportunity for threat actors, as data has become a highly commoditized asset in modern societies. Add to that the potential of harnessing unprotected IoT devices for botnets, denial-of-service attacks, or even holding them hostage to ransomware, the imperative for security cannot be ignored.

Several platforms and tools have emerged in the market recently, which can facilitate security implementation, even in the most basic IoT devices. From a hardware perspective, many semiconductor manufacturers, such as STMicroelectronics, NXP, Renesas, Microchip, Cypress, Nuvoton, MediaTek, RedPine, and Maxim Integrated, are offering secure microcontrollers that can service general-purpose IoT applications from smart home appliances to industrial control systems. Boosted by Arm’s Cortex M4 (and soon M23 and M33 cores), they can enable a host of secure functionalities, including security co-processors and cryptographic accelerators, secure storage for keys and certificates, secure execution environments, and root of trust functionalities.

But beyond that, these secure microcontrollers come prepackaged with supporting software development tools that can enable developers to leverage these hardware features and deploy secure services, such as key provisioning and onboarding to a cloud platform, as well as lifecycle management (e.g., secure over-the-air software updates).

In a bid to facilitate secure IoT deployments, the semiconductors vendors offer a wide breadth of software development platforms, from their own proprietary solutions but also focusing on interoperability and compatibility with third-party software and connectivity tools (such as those provided by Segger, Eclipse, Visual Studio, IAR Embedded Workbench, IDE Atmel Studio, Modbus Toolbox, Arm Keil & Pelion, Secure Thingz Deploy Architecture Azure Sphere, AWS & Google Cloud IoT Core, among many others).

The aim is to facilitate the use of secure hardware by providing secure software development and service connectivity tools that can easily allow developers to onboard and securely manage their devices. Developing and managing secure IoT deployments is no longer the remit of security professionals but is a capability that is quickly becoming available to developers of all levels.  Enterprises looking to deploy IoT can now more easily engage in securing them, in a more cost-effective manner that can enable faster time-to-market. End-to-end IoT security is within reach for enterprises large and small.

Get Deeper Insight Into Digital Security

These findings are from ABI Research’s Secure General-Purpose IoT MCUs competitive assessment report, part of our Digital Security research service. Click here to learn more about the service and subscribe

Digital security Research Service

Comments

No comments yet.

Post your comment