FEATURE IOT SUPPLEMENT
SECURING THE INDUSTRIAL IOT M2M FRAMEWORK
capturing and transmitting user-specific data between nodes. Since this data can be directly related or linked to an individual user, it is essential that the data be encrypted. This is increasingly being regulated and monitored by legislation which extends to the specification of encryption standards and protocols to be used. The inevitable result will be a requirement that communication processors used in M2M or IoT applications must have the capability of performing cryptographic operations, such as hashing, signing and encrypting data, as well as a secure key storage unit in order to meet regulatory requirements. Industrial communication links must also be secure, not just from data snooping but also from unauthorised control which could result in such costly events as taking down a production line. However, even if the data transmitted
between the network communication links is encrypted, the physical device may still be vulnerable to attack via an unauthorised modification of the program software. Therefore, a device must not only provide secure communication, but be able to operate as a trusted node. If you get information (data or a
Nicholas Sargologos, Senior Manager, Digital Networking at Freescale explores how the future will demand secure networking for industrial IoT applications and the route to implementation
T
he networking, industrial control, machine-to-machine (M2M) and
emerging Internet of Things (IoT) markets all share a similar basic requirement: the ability to connect a variety of end points together and support centralised control of the network. The widespread adoption of the Internet Protocol (IP) standard enables industrial automation, M2M and IoT applications to leverage common network connectivity building blocks. The adoption of Ethernet to enable
connectivity between industrial machines on the factory floor has been growing steadily as manufacturers seek greater visibility to data, improved productivity and the ability to remotely manage their industrial operations. Enhancing the visibility and management of networked factory devices, which enables streamlining of their associated functions, depends on the ability to ensure the data carried across the factory network remains secure. When it comes to networking processors, whether the design involves networking infrastructure, industrial control networks (gateways or PLCs) or factory floor equipment, some essential
S6 DECEMBER/JANUARY 2015 | ELECTRONICS
requirements must be satisfied: exceptional reliability, data security, efficient packet processing and enhanced connectivity support. In response, company’s such as Freescale, have developed the first networking processors, such as the company’s QorIQ family based on the ARM ISA.
ENTERPRISE NETWORK LINEAGE Meeting the needs of demanding and rugged networked applications is achieved by incorporating error detection and correction (ECC) technology on all memories, including Layer 1 and 2 caches, as well as SRAM and external DDR memory for maximum reliability, as well as watchdog timers. Complementing the reliability enabled by
ECC-protected memories is a high- performance security engine that supports a full array of data protection mechanisms, including secure boot, trust architecture, ARM TrustZone and manufacturing protection, which together enable the maximum in trusted node capability. These features are essential in IoT
applications where many edge of network devices and sensors will be
Figure 1:
Creating a secure IoT infrastructure
command) from a trusted source, you can assume that it is reliable, valid information. Booting up a trusted device requires a “root of trust,” which can be an external (typically expensive) device, such as an FPGA or ASIC, or it can be integrated in the SoC (system-on-chip) itself, as it is in the QorIQ LS1 product family. In the case of the LS1021A processor, authentication is performed within a preboot loader that is contained completely in internal ROM. This implementation provides a one-time user programmable authentication KEY to be used with the preboot loader, creating the trust needed to prevent unauthorised code/users from manipulating the system. The trusted node feature is enabled by
writing the authentication KEYs and an enable bit, which are one-time user programmable fuses. Once the Trust mode is enabled, external boot code image(s) (e.g., boot loader, OS kernels or even bare metal code) will only be executed after it has been decrypted and authenticated by the preboot loader KEYs. This code then becomes the next source of trust. Included in the decrypted/authenticated code can be data-like KEYs that can be used in the trusted communication links. Support for a primary and alternate (secondary) signed code images to provide additional reliability.
Freescale
www.freescale.com 01296 380 456
Enter 210 / ELECTRONICS
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56