designcon is part of the Informa Markets Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
April 5-7, 2022|Santa Clara Convention Center| Santa Clara, CA
Stephen Olsen (Principle Field Application Engineer, Blackberry)
Location: Ballroom B
Date: Thursday, April 7
Time: 3:05 pm - 3:35 pm
Track: Embedded IoT World
Format: Embedded IoT World Session
Theme : Internet of Things (IoT)
Education Level: All
Pass Type: 2-Day Pass, All Access Pass, Expo Pass
Vault Recording: TBD
Audience Level: All
The IoT is made up of many different manufactures from consumer electronics to remote sensors, and from industrial control systems to medical robots and even self-driving cars. Since these devices are so pervasive and so connected, they are a clear target for exploitation. So if one node can be compromised, then there are potentially hundreds even thousands of nodes that can be compromised as well. The harm done can range from causing the unit to no longer function, to potentially injuring an operator, passenger or consumer â€“ and these can result in a tarnished brand. So how can you prevent exploitation?
We will address some of the fundamental layers of security that you can deploy to ensure a robust product lifecycle and minimize the risk of being hacked. Starting with establishing a hardware root of trust, you can provision keys securely within the system. This enables you to perform secure over-the-air system upgrades for both new software loads as well as provisioning and decommissioning security keys. Then you can focus on securing the software supply chain by establishing exactly what is in your IoT devices. We will look at techniques to ensure the system is tamper-proof, including: only granting access to applications that truly need access, locking down the filesystem, controlling both temporal and spatial aspects of the embedded system, and monitoring to ensure run-time integrity.