Securing a microcontroller-based application for the IoT can be tricky. Security starts at the hardware level and then scales into the embedded software. To successfully secure the software, developers require that the underlying hardware support critical features such as: • Secure boot • Memory protection • Cryptographic engine accelerators • True random number generator (TRG) […]
READ MOREEarly proponents of the Internet of Things (IoT) took the centralized network approach that had worked so well within the comfortable confines of corporate IT and imagined it applied, unhindered, to hundreds, perhaps thousands of square miles of real-world geography. Yet in reality, the latency and vulnerability that topography and distance introduce stands to limit […]
READ MORE