search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
THE INTERNET OF THINGS SUPPLEMENT OUTSOURCING PRODUCTION SECURELY


Michel Villemain, CEO, Presto Engineering, says choosing the right outsourced operations company to manage the production process, can reduce the time, cost and risk associated with bringing a new IoT product to market


I


ncreasingly, IoT products are being designed and developed by innovative


companies who may have little or no experience with semiconductor manufacturing, a complex process that requires expertise across at least a dozen different disciplines. Moreover, IoT devices require a range of functionality not found in the traditional microprocessor and memory-oriented semiconductor industry. In addition to security, they typically need data storage and processing, analogue sensors, power storage and management, RF communications, and more. Combining all this functionality in a single device requires specialised knowledge and expertise. Outsourced operations companies, like Presto Engineering, Inc., provide that expertise, often as a turnkey service that takes a product from the completion of its design through fabrication, testing and packaging, all the way to delivery of finished goods. By leveraging surplus capacity at less advanced production facilities with the expertise of an outsourced operations company, it is now quite possible to produce a custom ASIC for less than $5 million USD. Outsourced operations for IoT products clearly must include secure provisioning. There are several important questions to consider when outsourcing production for an IoT device to a partner, specifically when it comes to security: 1. Hardware – Although software-


only solutions are available, tying security to hardware adds confidence and makes intrusion more difficult. Hardware solutions include: adding a separate SE (or similar technology), implementing secure capabilities


included in a stock MCU, or incorporating security functionality in a custom designed ASIC. MCUs and ASICs can reduce costs significantly. What is the most cost-effective solution given the technical and security requirements and anticipated unit volume of the application? 2. Trust – All hardware configurations


require provisioning by a trusted partner. Indications of trust include the level of investment in the physical plant and equipment, history and volume of secure operations, and staff experience in secure applications. What stake does the production partner have in maintaining a reputation for security? What investments have they made to secure that reputation? Is trust an essential component of their business model and brand equity? 3. Facility – Is the production facility


designed for both physical and data security? Can it ramp up in volume for IoT growth? 4. Certification – What security certification has the provider achieved? Are there regular audits and recertifications? 5. Flexibility – Can the production process be deployed to provide a cost- effective solution that meets security requirements and budgetary constraints?


/ ELECTRONICS


Secure and flexible provisioning services for IoT device vendors


Ideally, a secure production partner should offer certain key capabilities: 1) A standardized and certified (EAL5+) secure process. 2) The ability to handle a wide range of device types, form factors and security technologies. 3) Competitive pricing at low and


medium volumes with the ability to scale to larger volumes as required. 4) The flexibility to configure the production process and infrastructure to meet varying security and budgetary requirements.


All connected devices require security. Several secure technologies are available. SE technologies are well- proven and readily available, though the chips themselves add significant cost. Less expensive options include off-the- shelf processors or custom-designed ASICs that incorporate secure capabilities. Secure provisioning is a critical component in any security strategy. Using an outsourced operations company like Presto to manage the production process, including secure provisioning, can reduce the time, cost and risk associated with bringing a new IoT product to market.


Presto Engineering www.presto-eng.com


ELECTRONICS | JUNE 2017 S7


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56