Print Friendly, PDF & Email

A lot of the issues surrounding the IoT and security are really issues that involve embedded systems cybersecurity.

Any IoT device will have an embedded system. The IoT is simply the connection and control of smart devices – embedded systems coupled with network connectivity through internet protocols.

Effective embedded systems cybersecurity is essential because embedded systems in IoT are used in home automation, health and wellness, and security, among others. Likewise, an embedded system in IIoT (Industrial Internet of Things) is used in remote sensing and control for water, gas, utility meters, shipping/transportation management, robotics integration, and so on.

Consequently, an embedded security solution provides protection for IoT devices at the firmware level. Implementing this level of security within their devices can provide a number of benefits to IoT manufacturers, such as:

  • Competitive Differentiation
  • Increased Market Access
  • Device Security Management
  • Compliance With Laws
  • Customer Confidence
  • Device Security Management

Encryption is a primary embedded systems cybersecurity tool. There are various types of encryption protocols for embedded devices containing MCUs, and some can be very similar to those found on major CPUs.

If the MCU has enough program memory, RAM, and processing speed, it can run full-sized encryption algorithms such as the Data Encryption Standard (DES) or even Triple DES (3DES).

DES cryptography employs a “text data” approach wherein it uses a 56-bit long key, a key block cipher, and an encryption and decryption process.

During encryption, plain text and the keys are converted into binary bit data blocks of 64 bits each. These data blocks are then randomized based on an Initial Permutation (IP) table, stripped of each eighth bit (reduced to 56 bits), sent through a permutation table (PC-1), separated into two 28-bit data blocks, and then each half goes through several rounds (as many as 16 total rounds) of a circular left shift before passing through yet another Permutation table (PC-2).

Want to learn more? Tonex offers Advanced Embedded Systems Cybersecurity, a 2-day training course workshop where participants learn to explore vulnerabilities in embedded systems that are commonly exploited.

Participants also learn about key concepts, techniques, tools, risk assessment and management and strategies for integrating cybersecurity mitigation and measures into products and systems.

Learn the best practices to integrate cybersecurity into ConOps, requirements, architecture &  design, implementation, verification & validation, and operations &  maintenance processes.

For more information, questions, comments, contact us.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.