<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security &#8211; ASN Home</title>
	<atom:link href="https://www.advsolned.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.advsolned.com</link>
	<description>ASN home site</description>
	<lastBuildDate>Fri, 12 May 2023 08:32:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>IoT Security &#8211; 21st century solutions based on 9th century concepts</title>
		<link>https://www.advsolned.com/iot-security-21st-century-solutions-based-on-9th-century-concepts/</link>
					<comments>https://www.advsolned.com/iot-security-21st-century-solutions-based-on-9th-century-concepts/#respond</comments>
		
		<dc:creator><![CDATA[Dr. Sanjeev Sarpal]]></dc:creator>
		<pubDate>Mon, 16 Apr 2018 15:59:26 +0000</pubDate>
				<category><![CDATA[IoT]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.advsolned.com/?p=4042</guid>

					<description><![CDATA[<p>The internet of things (IoT) devices have been around for a number of years now, but very few smart sensors have any decent level of data security.&#160;For many organisations the issue of data security and secure remote updates to legacy products has become of paramount importance.&#160;Unfortunately, many of the engineers who design sensor products have [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.advsolned.com/iot-security-21st-century-solutions-based-on-9th-century-concepts/">IoT Security &#8211; 21st century solutions based on 9th century concepts</a> appeared first on <a rel="nofollow" href="https://www.advsolned.com">ASN Home</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="ember7949" class="ember-view">
<div class="reader-article-content">
<p>The internet of things (IoT) devices have been around for a number of years now, but very few smart sensors have any decent level of data security.&nbsp;For many organisations the issue of data security and secure remote updates to legacy products has become of paramount importance.&nbsp;Unfortunately, many of the engineers who design sensor products have little or no understanding a security algorithms, leading to systems that can be easily hacked &#8211; the fiasco of the UK smart meter system is a good example.</p>
<h3>&nbsp;<strong>Algorithms to the rescue</strong></h3>
<p>Algorithms and mathematics are usually regarded by many organisations as ‘academic black magic’ and are generally overlooked as a solution for a robust IoT commercial application. Nevertheless, some of you may be surprised by how old the concept of algorithms actually are in solving real world problems.</p>
<p>A few weeks ago, I looked through my old PhD thesis and stumbled across a reference to one of world’s first documented algorithms from the 9th century mathematician, Al-Khwarizmi (where, the word &#8216;algorithm&#8217; is derived from al-Khwarizmi’s name).</p>
<p>Al-Khwarizmi undertook pioneering work in algebra, which was popularized in his book, “al-Mukhtasar fi Hisab al-Jabr wa l-Muqabala” and altered society’s perspective of analyzing problems, be they a simple domestic chore or a complex mathematical concept.</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-full-width"><img decoding="async" src="https://media.licdn.com/dms/image/C4E12AQHplDRSaDwf9Q/article-inline_image-shrink_1000_1488/0?e=2123096400&amp;v=beta&amp;t=bcHkOwWEfS42j3vd_bEtMAm0CtDVDrvUlDxxOYNg-1k" data-media-urn="urn:li:digitalmediaAsset:C4E12AQHplDRSaDwf9Q" data-li-src="https://media.licdn.com/dms/image/C4E12AQHplDRSaDwf9Q/article-inline_image-shrink_1000_1488/0?e=2123096400&amp;v=beta&amp;t=bcHkOwWEfS42j3vd_bEtMAm0CtDVDrvUlDxxOYNg-1k"></div>
<blockquote><p>&nbsp;An excerpt from “Al-Mukhtasar fi Hisab al-Jabr wa l-Muqabala” for the solution to x^2 + 10x = 39.</p></blockquote>
<blockquote><p><strong>Translation</strong>: For the squares and roots equal to a number, it is as saying: a square and ten of its roots is equal to thirty-nine dirhams. The solution is to halve roots, equal to five in this problem, then, multiplying the root by itself then this will be twenty-five. Then add it to thirty-nine and this will be sixty-four. Then take the square root, which will be eight and subtract from it half the root, which is five. The remainder is three and that is the root you are seeking and the square is nine.</p></blockquote>
<p>I had forgotten (well, it was 14 years ago!) how elegant Al-Khwarizmi work actually was, and how I’m sure he would probably smile at the challenges that we’re facing today. Nevertheless, without his pioneering work, we wouldn’t have any of the IoT and security algorithms that we take for granted today.</p>
<h3><strong>Solutions in the 21st century</strong></h3>
<p>We’ve been pleasantly surprised by the rich offering from commercial IC vendors, such as: Atmel, NXP and Analog Devices in producing secure micro-controllers for the IoT market. Many of these micro-controllers include all of the necessary hardware encryption building blocks needed for building a secure IoT sensor, and some even offer a decent amount of processor power for data analytics algorithms.</p>
<p><strong>Sounds ideal, right?</strong></p>
<p>The Achilles heel of all of these solutions is how engineers implement them in a system. The micro-controller itself may be ‘secure’, but what about the system architecture (i.e. the algorithmic building blocks and and how they interact with each other). And what about encryption keys? How are they stored and updated? For the UK smart meter system mentioned above, the system just used one key for the whole system &#8211;&nbsp;not very secure ! It is this fact that is painfully overlooked by many, and as such, which eventually leads to the system being hacked and rendered useless.</p>
<p>In short, hardware based encryption technology is a great step in right direction for IoT device security, but without good understanding of encryption technology as part of the system architecture the solution is doomed to failure.</p>
</div>
</div>

<p><span class="" style="display:block;clear:both;height: 0px;padding-top: 20px;border-top-width:0px;border-bottom-width:0px;"></span>
                
                    <!--begin code -->

                    
                    <div class="pp-multiple-authors-boxes-wrapper pp-multiple-authors-wrapper pp-multiple-authors-layout-boxed multiple-authors-target-shortcode box-post-id-19551 box-instance-id-1 ppma_boxes_19551"
                    data-post_id="19551"
                    data-instance_id="1"
                    data-additional_class="pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode"
                    data-original_class="pp-multiple-authors-boxes-wrapper pp-multiple-authors-wrapper box-post-id-19551 box-instance-id-1">
                                                                                    <h2 class="widget-title box-header-title">Author</h2>
                                                                            <span class="ppma-layout-prefix"></span>
                        <div class="ppma-author-category-wrap">
                                                                                                                                    <span class="ppma-category-group ppma-category-group-1 category-index-0">
                                                                                                                        <ul class="pp-multiple-authors-boxes-ul author-ul-0">
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    
                                                                                                                    <li class="pp-multiple-authors-boxes-li author_index_0 author_ssarpal has-avatar">
                                                                                                                                                                                    <div class="pp-author-boxes-avatar">
                                                                    <div class="avatar-image">
                                                                                                                                                                                                                <img alt='' src='https://www.advsolned.com/wp-content/uploads/2023/05/sanjeevsarpal.jpeg' srcset='https://www.advsolned.com/wp-content/uploads/2023/05/sanjeevsarpal.jpeg' class='multiple_authors_guest_author_avatar avatar' height='80' width='80'/>                                                                                                                                                                                                            </div>
                                                                                                                                    </div>
                                                            
                                                            <div class="pp-author-boxes-avatar-details">
                                                                <div class="pp-author-boxes-name multiple-authors-name"><a href="https://www.advsolned.com/author/ssarpal/" rel="author" title="Dr. Sanjeev Sarpal" class="author url fn">Dr. Sanjeev Sarpal</a></div>                                                                                                                                                                                                        <p class="pp-author-boxes-description multiple-authors-description author-description-0">
                                                                                                                                                    Sanjeev is a RTEI (Real-Time Edge Intelligence) visionary and expert in signals and systems with a track record of successfully developing over 26 commercial products. He is a Distinguished Arm Ambassador and advises top international blue chip companies on their AIoT/RTEI solutions and strategies for I5.0, telemedicine, smart healthcare, smart grids and smart buildings.                                                                                                                                                </p>
                                                                                                                                
                                                                                                                                    <span class="pp-author-boxes-meta multiple-authors-links">
                                                                        <a href="https://www.advsolned.com/author/ssarpal/" title="View all posts">
                                                                            <span>View all posts</span>
                                                                        </a>
                                                                    </span>
                                                                                                                                <a class="ppma-author-user_email-profile-data ppma-author-field-meta ppma-author-field-type-email" aria-label="Email" href="mailto:sanjeev.sarpal@advsolned.com"  target="_self"><span class="dashicons dashicons-email-alt"></span> </a>
                                                                                                                            </div>
                                                                                                                                                                                                                        </li>
                                                                                                                                                                                                                                    </ul>
                                                                            </span>
                                                                                                                        </div>
                        <span class="ppma-layout-suffix"></span>
                                            </div>
                    <!--end code -->
                    
                
                                <style>
                .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-author-boxes-avatar img { 
        width: 80px !important; 
        height: 80px !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-author-boxes-avatar img {
        border-radius: 50% !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-author-boxes-meta a {
        background-color: #655997 !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-author-boxes-meta a {
        color: #ffffff !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-author-boxes-meta a:hover {
        color: #ffffff !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .ppma-author-user_url-profile-data {
        background-color: #655997 !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .ppma-author-user_url-profile-data {
        border-radius: 100% !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .ppma-author-user_url-profile-data {
        color: #ffffff !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .ppma-author-user_url-profile-data:hover {
        color: #ffffff !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .ppma-author-user_email-profile-data {
        background-color: #655997 !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .ppma-author-user_email-profile-data {
        border-radius: 100% !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .ppma-author-user_email-profile-data {
        color: #ffffff !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .ppma-author-user_email-profile-data:hover {
        color: #ffffff !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-author-boxes-recent-posts-title {
        border-bottom-style: dotted !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-multiple-authors-boxes-li {
        border-style: solid !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-multiple-authors-boxes-li {
        color: #3c434a !important; 
    }

    .pp-multiple-authors-boxes-wrapper.pp-multiple-authors-layout-boxed.multiple-authors-target-shortcode .pp-multiple-authors-boxes-li {
        border-radius: px !important; 
    }

            </style>
        
        </p>
		<div class="wpulike wpulike-default " ><div class="wp_ulike_general_class wp_ulike_is_not_liked"><button type="button"
					aria-label="Like Button"
					data-ulike-id="4042"
					data-ulike-nonce="3eb195741d"
					data-ulike-type="post"
					data-ulike-template="wpulike-default"
					data-ulike-display-likers=""
					data-ulike-likers-style="popover"
					class="wp_ulike_btn wp_ulike_put_image wp_post_btn_4042"></button><span class="count-box wp_ulike_counter_up" data-ulike-counter-value="+3"></span>			</div></div>
	<p>The post <a rel="nofollow" href="https://www.advsolned.com/iot-security-21st-century-solutions-based-on-9th-century-concepts/">IoT Security &#8211; 21st century solutions based on 9th century concepts</a> appeared first on <a rel="nofollow" href="https://www.advsolned.com">ASN Home</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.advsolned.com/iot-security-21st-century-solutions-based-on-9th-century-concepts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2018: The death of big data for IoT</title>
		<link>https://www.advsolned.com/2018-the-death-of-big-data-for-iot/</link>
					<comments>https://www.advsolned.com/2018-the-death-of-big-data-for-iot/#respond</comments>
		
		<dc:creator><![CDATA[ASN consultancy team]]></dc:creator>
		<pubDate>Mon, 16 Apr 2018 15:43:31 +0000</pubDate>
				<category><![CDATA[IoT]]></category>
		<category><![CDATA[algorithms]]></category>
		<category><![CDATA[Arm]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[DSP]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[sensors]]></category>
		<guid isPermaLink="false">http://www.advsolned.com/?p=4034</guid>

					<description><![CDATA[<p>With the advent of smart cities, and society&#8217;s obsession of &#8216;being connected&#8217;, data networks have been overloaded with thousands of IoT sensors sending their data to the cloud, needing massive and very expensive computing resources to crunch the data. Is it really a problem? The collection of all these smaller IoT data streams (from smart [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.advsolned.com/2018-the-death-of-big-data-for-iot/">2018: The death of big data for IoT</a> appeared first on <a rel="nofollow" href="https://www.advsolned.com">ASN Home</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div id="ember7949" class="ember-view">
<div class="reader-article-content">
<p>With the advent of smart cities, and society&#8217;s obsession of &#8216;being connected&#8217;, data networks have been overloaded with thousands of IoT sensors sending their data to the cloud, needing massive and very expensive computing resources to crunch the data.</p>
<h3>Is it really a problem?</h3>
<p>The collection of all these smaller IoT data streams (from smart sensors), has ironically resulted in a<strong> big data </strong>challenge for IT infrastructures in the cloud which need to process</p>
</div>
</div>



<p>massive datasets &#8211; as such there is<strong> no more room for scalability</strong>. The situation is further complicated with the fact, that a majority of sensor data is coming from remote locations, which also presents a <strong>massive security risk</strong>.</p>



<p>It&#8217;s estimated that the global smart sensor market will have over 50 billion smart devices in 2020. At least 80% of these IoT/IIoT smart sensors (temperature, pressure, gas, image, motion, loadcells) will use Arm&#8217;s Cortex-M technology, but have little or no smart data reduction or security implemented.</p>



<h3 class="wp-block-heading"><strong>The current state of play</strong></h3>



<figure class="wp-block-image"><img decoding="async" src="https://media.licdn.com/dms/image/C5612AQGANXlOBlIpsQ/article-inline_image-shrink_1500_2232/0?e=2123096400&amp;v=beta&amp;t=nhoKYU38ibmCSMB22rBRuZf9NKp5418HXDSmOaSonD8" alt=""/></figure>



<div class="slate-resizable-image-embed slate-image-embed__resize-full-width"></div>



<p>The modern IoT eco system problem is three-fold:</p>



<ul class="wp-block-list"><li>Endpoint security</li><li>Data reduction</li><li>Data quality</li></ul>



<p>Namely, how do we reduce our data that we send to the cloud, ensure that the data is genuine and how do ensure that our Endpoint (i.e. the IoT sensor) hasn&#8217;t been hacked?</p>



<h3 class="wp-block-heading">The cloud is not infallible!</h3>



<p>Traditionally, many system designers have thrown the problem over to the cloud. Data is sent from IoT sensors via a data network (Wifi, Bluetooth, LoRa etc) and is then encrypted in the cloud. Extra services in the cloud then perform data analysis in order to extract useful data.</p>



<p><strong>So, what&#8217;s the problem then?</strong></p>



<p>This model doesn&#8217;t take into account <strong>invalid sensor data</strong>. A simple example of this, could be glue failing on a temperature sensor, such that it&#8217;s not bonded to the motor or casing that it&#8217;s monitoring. The sensor will still give out temperature data, but it&#8217;s not valid for the application.</p>



<p>As for <strong>data reduction</strong> &#8211; the current model is ok for a few sensors, but when the network grows (as is the case with smart cities), the solution becomes untenable, as the cloud is overloaded with data that it needs to process.</p>



<p><strong>No endpoint security</strong>, i.e. the sensor could be hacked, and the hacker could send fake data to the cloud, which will then be encrypted and passed onto the ML (machine learning) algorithm as genuine data.</p>



<h3 class="wp-block-heading">What&#8217;s the solution?</h3>



<p>Algorithms, algorithms&#8230;.. and in built security blocks.</p>



<p>Over the last few years, hundreds of silicon vendors have been placing security IP blocks into their silicon together with a high performance Arm Cortex-M4 core. These so called enhanced micro-controllers offer designers a low cost and efficient solution for IoT systems for the foreseeable future.</p>



<p>A lot can be achieved by pre-filtering sensor data, checking it and only sending what is neccessary to the cloud. However, as with so many things, knowledge of security and algorithms are paramount for success.</p>
		<div class="wpulike wpulike-default " ><div class="wp_ulike_general_class wp_ulike_is_not_liked"><button type="button"
					aria-label="Like Button"
					data-ulike-id="4034"
					data-ulike-nonce="1df77aa9a6"
					data-ulike-type="post"
					data-ulike-template="wpulike-default"
					data-ulike-display-likers=""
					data-ulike-likers-style="popover"
					class="wp_ulike_btn wp_ulike_put_image wp_post_btn_4034"></button><span class="count-box wp_ulike_counter_up" data-ulike-counter-value="+2"></span>			</div></div>
	<p>The post <a rel="nofollow" href="https://www.advsolned.com/2018-the-death-of-big-data-for-iot/">2018: The death of big data for IoT</a> appeared first on <a rel="nofollow" href="https://www.advsolned.com">ASN Home</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.advsolned.com/2018-the-death-of-big-data-for-iot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
