Device Security: Endpoint, to Gateway, to Cloud

With 15 billion devices already connected, and another 12 billion expected to go online in the next two years, the Internet of Things (IoT) is growing and evolving rapidly. There is already a wide diversity of applications reaching into almost every aspect of life and work. IoT applications predominantly involve sensing and control. The widespread adoption of IoT has heavily influenced sensor development, leading to improvements such as smaller size to fit in IoT devices for various environments, greater power efficiency to minimise reliance on connecting mains power or changing batteries, and the integration of on-device data processing and wireless connectivity.

Sensor evolution

At this point in the evolution of the IoT, many applications are conceived to provide accurate and real-time monitoring of environmental conditions in smart buildings, agriculture, industrial processes, and smart cities. This is driving advancements in environmental sensors, such as temperature, humidity, and air quality sensors.

IoT Device Security

On the other hand, motion and occupancy sensors are continually improving to provide enhanced sensitivity, improved range, and reduced power consumption, making them valuable in applications such as home automation, security systems, and energy management. In addition, inertial sensors are now entering the market with embedded intelligence. These sensors incorporate features such as a small machine-learning core containing decision trees, or a DSP optimised to run deep learning algorithms. With this embedded intelligence, inertial sensors can perform tasks such as human-activity tracking or anomaly directly within the sensor, all while consuming very low power.

There are also advancements in imaging sensors, including cameras and video sensors, that deliver higher resolution, improved image quality, enhanced low-light performance, and advanced capabilities like object recognition and tracking, to meet the demands of smart vision-based IoT solutions and other innovations like autonomous vehicles.

Historic evolution of sensors

Figure 1: Historic evolution from "Sensor 1.0" to smart sensors, i.e. "Sensor 4.0" (Source - ResearchGate)

Developments in chemical and gas sensors include improved sensitivity and selectivity, enabling detection of smaller concentrations of target substances with fewer false positives and greater reliability, as well as faster response times. They enable IoT applications such as pervasive air quality monitoring and detecting hazardous substances for purposes such as ensuring workplace safety.

In addition, the spread of the IoT can be credited with the rapid advancements in micro-power energy-harvesting systems that utilise ambient energy sources like light, vibration, or temperature differences to power IoT devices like sensors. As the power demand of IoT sensors continues to fall, with each successive generation, more and more of them can leverage energy harvesting to become self sustaining: thereby reducing reliance on traditional power sources such as batteries to extend lifetime and reduce maintenance overheads.

With the combined improvements in sensing ability, power efficiency, connectivity, and embedded intelligence, the IoT is enabling an unprecedented pervasiveness in sensing that can feed Big Data analytics. Compared to conventional industrial control and monitoring strategies, industrial IoT (IIoT) applications can involve larger numbers and more diverse types of sensors installed throughout a factory. These can range from relatively simple equipment condition monitoring using sensors such as MEMS inertial sensors to detect abnormal vibrations that can indicate excessive wear, to digital twinning that builds a working virtual model of the system in the cloud. Sensor readings such as temperature and humidity in a manufacturing environment can be stored with other traceability data for quality control and continuous improvement. The sensors installed throughout a smart factory to capture machine and process data, equipment data, environment data for purposes such as resource planning, quality control, traceability, and continuous improvement can generate terabytes or even petabytes of raw data per hour. With the sub-microsecond latency promised by private industrial 5G networks, IIoT applications can handle real-time control of processes and moveable assets such as autonomous factory vehicles.

The IoT applications of the future are sure to eclipse today’s in every way; the number of sensors, the volume of data, the time to insight, and the value derived.

One thing likely to remain consistent is that the endpoints in the IoT will continue to have limited resources in terms of energy supply and power, processing capability, and size. However, these endpoints, being connected to other assets and the owner/operator’s network,can also represent a potential weak point that hackers can exploit. Due to their processing limitations, heavy security protocols cannot be easily employed. Therefore, an effective strategy should focus on protecting against hacking without requiring intensive processing and without cumbersome exchanges of authentication credentials.

We understand that the IoT can be overwhelming, so if you need support with your next IoT project or IoT security in particular, why not get in touch with our experts? Our IoT, Wireless and Connectivity teams are on hand to help you with your next IoT challenge.

Learn More

Security

Secure Provisioning

Services providing keys and certificate injection into Secure Elements or MCU for full end-to-end Security.

Edge Lock SE051 in HX2QFN20 package

Figure 2: The NXP EdgeLock SE051 is an example of an Embedded Secure Element

Security for endpoints

When choosing hardware for IoT endpoints, designers should consider several factors to ensure proper protection against hacking and enhance overall security. Here are some key considerations:

  • A secure boot mechanism based on a hardware root of trust within the device is essential for preventing the execution of unauthorised code or malware from running. The concept of a hardware root of trust establishes a simple and unchangeable method of verifying the fundamental authenticity of the device, burned in at the time of manufacture, which allows the device to authenticate the boot-up code and, subsequently, the application code before loading. Additionally, devices need protection against the threat of rogue code at times when firmware is updated over the air (OTA). Secure boot and secure firmware update are both predicated on ensuring that only authorised and digitally signed firmware can be loaded and executed on the device. It’s important to assess the vendor’s track record in providing timely updates to apply security patches and maintaining a secure ecosystem.
  • With the addition of an embedded secure element (eSE), a microcontroller or system on chip (SoC) can provide secure storage for cryptographic keys and support secure authentication capabilities. Many microcontrollers integrate hardware cryptographic accelerators to protect data from interception or eavesdropping.

 

  • Special features to resist physical attack are also needed, particularly to protect devices that are installed in non-secure areas and can be vulnerable to tampering or side-channel attacks such as power analysis.

 

  • A holistic security approach should also include robust software design, secure communication protocols, and regular security assessments throughout the development lifecycle of the IoT endpoint.

Connecting endpoints to the cloud

Gateways, or data aggregators, handle communication, data exchange, and management between IoT endpoints and the cloud. Often based on an application-class processor such as a multicore Arm Cortex-A system on chip, whereas endpoint devices would run on embedded-class Cortex-M cores, they also tend to take on most of the edge processing workload. They support software platforms that assist interaction with the cloud, such as Azure IoT, and integrate appropriate wired and wireless connection standards.

Typical connectivity includes Ethernet, commonly used in industrial settings and infrastructure deployments where a wired connection to endpoint devices can be established using cables and where applications require low latency and high data transfer rates. Industrial-focused gateways also often support serial communication using protocols like RS-232, RS-485, or Modbus to facilitate connecting to legacy devices that exist in factories for many years.

Wireless communication enables endpoints to be connected in situations where installing cables is inconvenient or impossible. Adding or removing endpoints is also straightforward, requiring no new installation or removal of cables, and wireless allows flexibility to assign the locations of endpoints and change these relatively easily if needed.

WiFi is often used to connect endpoint devices, which allows seamless integration into home automation, consumer electronics, and smart building applications. Longer-range connectivity requirements are served by 3G cellular and dedicated 4G LTE standards such as NB-IoT and LTE-M. As 5G networks roll out, more and more applications are expected to leverage 5G’s built-in provision for massive machine-type communications (MMTC) and ultra-low latency communication (ULLC). Low-Power Wide Area Network (LPWAN) technologies like LoRaWAN and Sigfox are also long-range wireless standards suitable for IoT applications. Depending on the size of the application and the amount of data exchanged over the radio interface, LPWAN can be more cost-effective than cellular.

In addition to these, Bluetooth® is popular for short-range connections to devices like wearables and personal area networks, while others such as Zigbee® are usually chosen for low-power, mesh network deployments in smart homes, industrial automation, and lighting control systems.

Securing the gateway

Hardware-based security features are as important in the gateway as they are in endpoints and may be based on an architecture such as Arm® TrustZone®. TrustZone is optimised for microcontrollers and for application processors, and established isolation between non-secure parts of the system and secure parts that are critically dependent on trust. And physically separates secure and non-secure processing and data storage to combine a high level of protection with minimal impact on execution performance. Generically, this is the same principle as a Trusted Execution Environment (TEE), which provides isolated execution spaces for running critical operations or handling sensitive data.

While assessing devices such as microcontrollers and SoCs for IoT applications, industry-recognised security certifications such as Common Criteria, FIPS 140-2 provide evidence that the hardware has been tested to meet specific security requirements.

The gateway’s connection to the cloud leverages protocols like HTTP Secure (HTTPS) and Transport Layer Security (TLS)  to establish encrypted connections, safeguarding data integrity and confidentiality. On the other hand, lightweight messaging protocols such as Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) are commonly used for IoT device-to-cloud communication. These enable efficient data transmission, with low demand for bandwidth and facilitating real-time or near real-time updates.

While these are dependent on protection such as secure boot and physical attack resistance, in a similar way to endpoint devices, the hardware embedded in gateways tends to have greater resources for handling higher-level software-based security. For instance, they can handle secure communication protocols such as TLS  or Datagram Transport Layer Security (DTLS), to encrypt data transmission between the IoT gateway and connected devices or cloud services. Strong access controls and authentication mechanisms are also needed to prevent unauthorised access to the IoT gateway. This includes using unique credentials, implementing two-factor authentication, and regularly updating and rotating passwords.

Firewalls and Network Segmentation are also important security precautions at the gateway level. The firewall restricts incoming and outgoing traffic and allows only necessary communications. Network segmentation minimises the potential attack surface by enabling devices to be separated from critical infrastructure and sensitive systems.

Arm TrustZone explained

Figure 3: Arm TrustZone explained - a security technology that begins in the hardware of the Arm processor chip, which is the basis for secure boot. There are some Arm processors with TrustZone in both the Arm Cortex-A and Cortex-M series (Source - Microcontroller Tips).

Regular security audits and penetration testing are advised, as well as rigorous monitoring of the gateway's operation and network traffic for potential security incidents.

Conclusion

Advancements in IoT hardware and security are crucial for protecting and ensuring the reliability of connected devices and systems as the IoT continues to expand. Improved sensors offer greater accuracy, power efficiency, and embedded intelligence, while micro-power energy-harvesting systems reduce reliance on traditional power sources and extend device lifetimes.

To address potential vulnerabilities, effective security measures must be implemented. Hardware-based features like secure boot mechanisms, embedded secure elements, and secure storage for cryptographic keys prevent unauthorised code execution and enable secure authentication. Robust software design and physical attack resistance further enhance IoT endpoint security. Gateways play a vital role in connecting endpoints and securing data exchange. Hardware-based security features, secure communication protocols, access controls, authentication mechanisms, firewalls, and network segmentation contribute to gateway security.

Regular security assessments, penetration testing, and monitoring are essential for identifying and addressing security incidents. Prioritising security at all levels, from endpoints to gateways to the cloud, mitigates risks, and ensures IoT advancement. By focusing on IoT hardware advancements and robust security measures, we can confidently embrace the IoT's potential while addressing the challenges posed by its growth.

Security

Secure Elements

Hardware Root of Trust used for crypto operations and key storage.

Security

Secure Library

Software Root of Trust integrated into any MCU/MPU used for crypto operations and key storage.

Security

Secure MCU

MCU with built in security features and key storage.

Service

See IoTConnect

The IoT can be overwhelming. You need to leverage new technologies like AI, deep learning and data mining to make the most of your investment. Let us help you.