INDEX

Securing the Internet of Things

This report examines a number of security considerations in the context of the Internet of Things (IoT), notably at the hardware and design levels. The first part looks at the security issues associated with the IoT and the reasons behind the IoT’s vulnerable state of affairs. The second part analyzes how security can be applied at the hardware level, and the various possibilities for embedding security and producing a secure IoT product development context. The final part looks at some of the player spearheading the IoT security market in terms of secure hardware integration, design and testing.

Table of Contents

  • 1. A PROMISING TECHNOLOGY STRUGGLING WITH SECURITY
    • 1.1. The Vulnerable Layers
    • 1.2. The Problem of Access Control
    • 1.3. No Unified Protocol Security
    • 1.4. Outsourcing to the Gateway
    • 1.5. Data Privacy Challenges
    • 1.6. Under the Radar: Consumer Safety
    • 1.7. Security versus Effectiveness versus Risk
    • 1.8. Developing an IoT Security Framework
  • 2. STRENGTHENING ALL THE THINGS!
    • 2.1. A Hardware Problem
    • 2.2. How to Embed Security?
    • 2.3. Trusted Computing
    • 2.4. Leveraging SIM Cards
    • 2.5. Wireless Communication Technologies
    • 2.6. Security Protocols
    • 2.7. Authentication and Access Control
    • 2.8. Intrusion Detection
    • 2.9. Data Protection
    • 2.10. Trust Management
    • 2.11. The Role of Secure Design, Development, and Product Lifecycle
  • 3. SILICON AND APP TESTING PLATFORMS FOR SECURE DESIGN
    • 3.1. Arrayent
    • 3.2. Hewlett-Packard
    • 3.3. Microchip Technology
    • 3.4. NXP Semiconductors
    • 3.5. Sonatype
    • 3.6. Wind River

Tables

  1. Installed Base of Wireless Connected Devices by Vertical Market, World Market, Forecast: 2014 and 2020
  2. High-Profile IoT Hacks
  3. Mobile Hardware Security Submarket, World Market, Forecast: 2014 to 2019
  4. NFC Embedded Secure Element Smart Card IC Market, World Market, Forecast: 2014 to 2019
  5. RFID Security
  6. Authentication and Anti-counterfeiting IC Market, World Market, Forecast: 2014 to 2019
  7. TSM Revenues Services by Application, Worldwide Forecast 2013 to 2019

Figures

  1. Root of Trust