Securing billions of IoT devices requires a new key provisioning method that scales. Even the most innocuous IoT endpoints (such as webcams, DVR recorders and light bulbs) need protection, as demonstrated by the September 2016 Mirai cyber attack. The exploitation of these types of nodes led to a large scale disruption of Internet services. The economic impact of such attacks can be huge, but they are only an early warning of what is to come. The best way to protect against the expansion of these threats is to prioritize the integration of appropriate and affordable security measures for all IoT devices from endpoints to hosts, hubs and the cloud. Important barriers that hold back this integration come with a high cost, inflexibility, and lack of scalability of legacy key injection models.
In this white paper we propose an IoT key provisioning method based on SRAM Physical Unclonable Functions. This method removes the barriers to securing a broad range of IoT devices, even resource-limited endpoints, building the foundation for an Internet of Things we can trust.
- Securing IoT Devices – Current and Future Needs
- Key Provisioning in Today’s Supply Chain
- Keys Extracted from a Chip’s Silicon Fingerprint
- Scalable Key Provisioning from Silicon to Cloud
- Complete Provisioning Flow
Please complete this form and we will send you our white paper Flexible Key Provisioning with SRAM PUF. Fields with an asterisk (*) are required.