search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
FEATURE IOT security


Stay secure on the edge


Sfera Labs explains its role in protecting edge devices from attacks, tampering and unauthorised access


I


n an era where the Internet of Things (IoT) is rapidly expanding, ensuring the security of edge devices is paramount. These devices, often situated in uncontrolled environments, are vulnerable to various forms of attacks, ranging from remote unauthorised access to physical tampering. To fortify the defence of these devices, solutions such as Secure Element Chips, Tamper Detection hardware, as well as fully assembled and encapsulated general-purpose, secured computing platforms are gaining traction. At the core of edge devices security strategies lies the integration of Trusted Platform Modules (TPM) or Secure Elements (SE). These hardware-based solutions serve as a cornerstone in establishing trust at the device level. By leveraging hardware cryptographic accelerators, a true random number generator, and secure key storage, they ensure that sensitive key material remains protected from unauthorised access. Their adoption not only enhances security, but also simplifies the deployment and management of IoT devices, even for organisations lacking extensive security expertise. Secure elements provide functionalities used in a wide range of cryptographic applications, including blockchain- related ones. Examples span from the provisioning of unique identifiers, which serve as the foundation for device authentication (generated either during the manufacturing process or dynamically at runtime), to the generation of random values derived from the internal noise source (making sure adequate entropy is maintained when utilised), as well as the implementation of several cypher suites that meet standards often required by the industry, released by the NIST and other organisations. Furthermore, when coupled with their accompanying toolsets, secure elements such as Microchip’s ATECC608B and its Trust Platform, enable effortless integration with cloud-based platforms like AWS IoT. In addition to robust cryptographic measures, motion sensors (i.e


26 October 2024 | Automation


accelerometers) can be used for tamper detection to add another layer of defence against physical attacks. These sensors, strategically placed within the device enclosure, monitor changes in orientation or movement. Any unauthorised attempt to open or tamper with the device triggers an alert, allowing for immediate response and mitigation. Coupled with other security mechanisms, such as secure elements, motion sensor tamper detection provides a comprehensive approach to safeguarding edge devices, ensuring the integrity of sensitive data by locking it or even destroying it if a possible breach is detected.


Further methodologies include the monitoring of the main power supply, as well as possible auxiliary batteries, to ensure continuous availability of power to critical components. By closely monitoring power sources, anomalies such as sudden power surges, fluctuations, or unexpected power outages can be detected promptly, alerting cybersecurity teams to potential threats or attempted breaches. Additionally, monitoring auxiliary batteries ensures that backup power systems are functioning correctly, providing resilience against power-related cyberattacks or disruptions. Sfera Labs’ commitment to security extends beyond individual components to encompass a holistic approach to device security. By integrating secure element chips, motion sensors, system- wide monitoring tools, and various I/O interfaces, Sfera Labs ensures that customers benefit from state-of-the-art security features without compromising on performance or usability. Whether deployed in industrial environments, smart cities, or healthcare facilities, Sfera Labs’ devices offer robust protection


against evolving threats, instilling confidence among users and stakeholders alike.


Sfera Labs’ latest addition to its product line, Strato Pi Max, combines a Raspberry Pi core to a modular and expandable set of security, safety, and fault-resilience peripherals to address any scenario. Strato Pi Max also comes with the option of using Zymbit’s Secure Compute Module (SCM) as processing core to further enhance its security capabilities Sfera Labs collaborates closely with Zymbit to optimise the integration of the SCM into their devices. This collaborative effort ensures seamless interoperability and maximises the security benefits offered by both technologies. By leveraging Zymbit’s expertise in secure computing and incorporating it into their devices, Sfera Labs enhances the overall security posture of their solutions, delivering protection against emerging threats. As the IoT landscape continues to evolve, the importance of robust security measures cannot be overstated. The above mentioned solutions represent critical components in safeguarding edge devices against a myriad of threats. Companies like Sfera Labs are at the forefront of innovation, delivering secure and resilient solutions that meet the demands of today’s interconnected world. As threats evolve, staying ahead of the curve requires a proactive stance towards security, embracing cutting-edge technologies to fortify the defences of edge devices and ensure a secure foundation for the IoT ecosystem.


CONTACT:


Sfera Labs sferalabs.cc


automationmagazine.co.uk


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48