Deliver Enhanced Security and Deploy Embedded Devices Faster to Market with OPTIGA™ TPMs and ARM Development Boards

Introduction

With the awareness and concern over attacks and information theft, it is now a necessity to include rigorous security technology in all Internet-of-Things (IoT) and edge devices. This includes IoT sensors, controllers, and actuators, as well as edge computing, audio-visual security devices, and otherwise internet/remotely connected electronics. Part of this need is derived from potential security concerns with server and router hardware, which has recently been subjected to highly sophisticated malware, attacks, and information stealing exploits. And with reported increases of security breaches related to IoT devices in recent years, it is likely that IoT and edge device security is only going to be under increasing threat in years to come. [1,2]

Hence, there is a necessity to for security in every connected and networked device to protect the growing smart home, smart office, and smart city infrastructure. Until recently, the requirements for additional security required customized hardware solutions of devices to hold and encrypt/decrypt keys, as software security alone is inadequate for ensuring secure storage and authentication. The early challenges associated with conceiving, designing, prototyping, and finally, implementing hardware security were generally daunting, and the hardware solutions were often specific to a particular communications technology. This led to lax security in smart home and edge devices, including automobiles, security cameras, smart locks, sensors, thermostats, and edge computing solutions.

Fortunately, there are now integrated solutions that operate as Trusted Platform Modules (TPMs) that are communications technology agnostic. Furthermore, these new TPMs can readily be fitted on to Rapid Development and Prototyping Boards, such as the 96Boards to ease development. Moreover, Infineon Technologies and Arrow have partnered to create Infineon security chip-powered TRESOR Mezzanine Boards, with help from FAE Technologies, compatible with 96boards (Arrow Thor96), which eliminates the need for custom security hardware and extensive developer resources, and reduces the time to market for IoT and edge electronics solutions.



Body Image 1-Infineon Security Optiga TPMs and ARM Development Boards-666x380

OPTIGA™ TPMs can be used to enhance the security of critical IoT and connected devices

 

Overview of Hardware-based Versus Software-based Security

Software-based security and encryption technologies have been in use since the first software was being developed. Moreover, the portability and interoperability of software-based encryption has led to its widespread use, from protecting entire platforms and organizations, devices and networks, to protecting data on portable storage devices. Software-based security and encryption is relatively easy to update and upgrade, and can be used to protect data being transmitted.

However, Software-based security is only as secure as the operating system running the software, and software-only security may not hold up to modern security demands [1,2,3,4]. As any operating system and software has bugs, attackers have become very good at exploiting these bugs as security weaknesses. Hence, any given software-based security and encryption method can be expected to have several unintended vulnerabilities from bugs and operating system weaknesses.

Moreover, software security technologies require additional processing, memory, and storage beyond the limited CPU and memory typically included in IoT and edge devices and may thus lead to the use of much larger and more power hungry processors and memory than would be necessary with hardware-based security technologies. Also, software-based security and encryption, unless also augmented with hardware-based secure storage, must rely on generally insecure memory and storage for vital security information, such as sensitive data and secure keys.

Good hardware-based security and encryption also doesn’t depend on the security of the host system, and is thus immune to operating system exploits and other software vulnerabilities. Additionally, many hardware-based security modules also contain their own secure storage, protected against software and operating system vulnerabilities. And the specialized cryptographic accelerators contained in hardware-based security modules avoids burdening IoT processor resources.



Body Image 2-Infineon Security Optiga TPMs and ARM Development Boards-637x342

Security implemented in hardware combined with Software offers more benefits to IoT Device manufacturers than only security running on MCU

 

Benefits of Integrated Security Solutions

Some of the early arguments against hardware-based security and encryption centered on the additional cost, difficulty, and delay it would introduce into the production timeline. Custom hardware security solutions still face the same challenges. However, there are now readily available prebuilt security modules, such as a Trusted Platform Module (TPM), which offer standardized security, with modules that are designed to be compatible with even the most compact IoT devices or most rugged automotive and industrial devices.

TPMs provide several key hardware-based security features, namely digital device IDs, device authentication, secure communications, data confidentiality, IP protection, secure key storage, secure firmware updates, and support for a variety of encryption algorithms. TPMs efficiently generate, distribute, store, and manage cryptographic keys, including custom keys. If a TPM is manufactured in a certified secure production environment, then OEMs only need to integrate the TPM with the embedded device hardware without needing to redesign processes or modify the production environment. Moreover, the established TPM standard also supports secure over-the-air (OTA) updates, thus ensuring cryptographic agility over the life of the IoT or edge device.

As there is such an expansive diversity of IoT applications and use cases, a leading semiconductor manufacturer, Infineon, offers an incredibly wide range of standalone hardware-based security solutions: the OPTIGA™ product family [5,6]. This includes OPTIGA™ TPMs designed specifically for the standards and expectations of smart home, lighting, city, sensors, industrial, automation, gateways, routers, servers, and automobiles.



Body Image 3-Infineon Security Optiga TPMs and ARM Development Boards-774x333

Infineon offers a wide range of hardware security solutions that are designed to offer superior security services for every type and level of IoT device

 

Highlights of 96Boards as a Development and Prototyping Tool

Development boards have become a necessary tool for prototyping and development of embedded systems. Initially, these development boards were only produced by and geared toward a specific processor with few I/O options. More recently, there have been industry initiatives to develop standardized development board platforms that can work with a variety of microprocessor units (MPUs) and incorporate an expanse of add-ons. 96boards are such an initiative, and now feature a huge variety of development boards fit for consumer, enterprise, and IoT applications [7].

96boards are a SoC-agnostic development platform compatible with ARM-based processors, and offer a cost effective and efficient way for hardware, software, and OS developers to work on common platforms that can be used for prototyping or even integrated into new systems.

A custom Arrow Electronics 96Board, referred to as the Thor96 Board, is a powerful quad-core single-board computer (SBC) with a dedicated GPU, dedicated VPU, Wi-Fi, HDMI output, Bluetooth, Thread/Zigbee, and myriad of I/O options [8]. These capabilities make this board an incredibly useful development tool for IoT and Edge-device applications, such as industrial PCs, servers, industrial controllers, or edge gateways.

 

Leveraging the TRESOR Mezzanine Board & Thor96 Board for Prototyping Secure IoT and Edge Electronics

Addressing the biggest challenges with prototyping and developing security technologies for IoT applications, a new mezzanine board compatible with 96Boards has been released that features two Infineon OPTIGA™ TPMs (SLB9670 & SLB9645) and an Infineon OPTIGA™ TRUST E authentication chip (SLS32AIA020A) [11]. This new TRESOR mezzanine board can be easily installed on a Thor96 Board, where Arrow-supplied example code can be employed to jump-start development and prototyping [9].


Body Image 4-Infineon Security Optiga TPMs and ARM Development Boards-606x477-edit

The TRESOR Mezzanine Board is an add-on to the popular 96Boards that includes secure TPM devices (OPTIGA™ TPM) from Infineon Technologies, as well as an authentication chip (OPTIGA™ Trust E)

 

With a TPM 2.0, TPM 1.2, and TRUST E authentication chip, hardware and software developers can explore a vast array of methods of implementing state-of-the-art security elements. The TRESOR board TPM 2.0 communicates over SPI using 96Boards standard LS expansion connector, while the TPM 1.2 chip communicates over I2C on the 96Boards standard low-speed expansion connector. The Trust-E authentication chip communicates using the same I2C bus as the TPM 1.2 chip. Furthermore, debugging is made much easier with an on-board UART to USB conversion chip, which enables debugging through standard USB to Micro USB interconnect. This mezzanine board is designed to be powered from the +5 V rail from the host board.

Connecting the TRESOR mezzanine board to the Thor96 board just requires plugging the mezzanine board into the appropriate slot, followed by a simple software setup. For the Application Note please visit the TRESOR board Product Page. A development PC with a Yocto built environment for the Thor96 board is the only other piece needed to begin developing secure elements with the Thor96 Board and TRESOR mezzanine solution.

 

How Thor96 and TRESOR Mezzanine Secure IoT & Edge Devices

One of the most significant vulnerabilities with IoT security is often the communications, either wired or wireless, between the IoT device and other IoT devices or edge devices. There have been cases where firmware updates, initialization processes, and assumed secure communications have been hijacked or intercepted by attackers and later used to install malware or gain access to other devices on the network.

The only way to prevent these types of attack vectors is to eliminate the insecure aspects of the communications exchanges. Built-in hardware security that ships with a device can encrypt and authenticate the communications from other network devices, as well as enable successful firmware updates and an appropriately response to anomalies. There may also be sensitive information stored on IoT and edge devices that can be exploited. Hence, TPM modules can be used to store sensitive information, along with security keys. Thus critical security information would remain inaccessible to attacks even if an IoT module was physically stolen,. By encrypting critical data with keys protected by the TPM and setting a policy for when the data can be decrypted (known as “sealing”), even malware that infects the device can be prevented from accessing that data.

 

Conclusion

In the age of IoT and edge devices becoming essential features of homes, retail, offices, industrial complexes, automobiles, and virtually all environments, securing each interconnected element of these smart systems is necessary. As software security is inadequate to protect critical security information and keys, hardware security solutions, such as TPMs, are vital in preventing dangerous malware intrusions and information theft. To ease the use of hardware security solutions in IoT and edge devices, Infineon and Arrow deliver the Thor96 Board ARM-based SBC with the TRESOR Mezzanine Board which feature enhanced security technologies designed to offer ease of development for early development and prototyping, as well as rich features ideal for system integration.

 

Resources

  • 1. https://www.scmagazineuk.com/dramatic-increase-iot-related-data-breaches-due-unsecured-devices/article/1584100
  • 2. https://healthitsecurity.com/news/microsoft-warns-hackers-targeting-iot-devices-to-breach-networks
  • 3. https://www.infineon.com/dgdl/Infineon-Why_Securing_Network__Equipment_is_Key_to_Supporting_IoT_Infrastructure-WP-v01_00-EN.pdf?fileId=5546d46265f064ff01665872e7940ce7
  • 4. https://www.infineon.com/dgdl/Infineon-Securing-the-smart-and-connected-home-WP-v01_00-EN.pdf?fileId=5546d462689a790c01690e9de8df380c
  • 5. https://www.infineon.com/cms/en/product/security-smart-card-solutions/optiga-embedded-security-solutions/optiga-tpm/
  • 6. https://www.youtube.com/watch?v=gRatJHpIM0A
  • 7. https://www.96boards.org
  • 8. https://www.arrow.com/products/i.imx8-thor96/arrow-development-tools
  • 9. https://www.arrow.com/products/tresor/arrow-development-tools
  • 10. https://fae.technology/en/prodotti/tresor/
  • 11. https://www.infineon.com/cms/en/product/security-smart-card-solutions/optiga-embedded-security-solutions/optiga-trust/optiga-trust-e-sls-32aia/


Ähnliches Produkt:

SLS32AIA010MHUSON10XTMA2

Infineon Technologies AG Authenticators Anzeigen

Ähnliches Produkt:

OPTIGATRUSTMEVALKITTOBO1

Infineon Technologies AG Eingebettete Systementwicklungsboards und -kits Anzeigen

Ähnliches Produkt:

S2GOSECURITYOPTIGAMTOBO1

Infineon Technologies AG Eingebettete Systementwicklungsboards und -kits Anzeigen

Ähnliches Produkt:

SLS32AIA020X2USON10XTMA4

Infineon Technologies AG Authenticators Anzeigen

Ähnliches Produkt:

S2GOSECURITYOPTIGAXTOBO1

Infineon Technologies AG Eingebettete Systementwicklungsboards und -kits Anzeigen

Ähnliches Produkt:

SLM9670AQ20FW1311XTMA1

Infineon Technologies AG Secure Microcontrollers and TPM Anzeigen

Ähnliches Produkt:

SLB9670VQ20FW785XTMA1

Infineon Technologies AG Secure Microcontrollers and TPM Anzeigen

Ähnliches Produkt:

SLE952500000XTSA1

Infineon Technologies AG Authenticators Anzeigen

Ähnliches Produkt:

Thor96 Board | I.IMX8_THOR96

Arrow Development Tools Single Board Computers - SBCs Anzeigen

Ähnliches Produkt:

TRESOR

Arrow Development Tools Eingebettete Systementwicklungsboards und -kits Anzeigen

 

 

Neue Beiträge

Leider ergab Ihre Suche kein Ergebnis

Aktuelles über Elektronikkomponenten­

Wir haben unsere Datenschutzbestimmungen aktualisiert. Bitte nehmen Sie sich einen Moment Zeit, diese Änderungen zu überprüfen. Mit einem Klick auf "Ich stimme zu", stimmen Sie den Datenschutz- und Nutzungsbedingungen von Arrow Electronics zu.

Wir verwenden Cookies, um den Anwendernutzen zu vergrößern und unsere Webseite zu optimieren. Mehr über Cookies und wie man sie abschaltet finden Sie hier. Cookies und tracking Technologien können für Marketingzwecke verwendet werden.
Durch Klicken von „RICHTLINIEN AKZEPTIEREN“ stimmen Sie der Verwendung von Cookies auf Ihrem Endgerät und der Verwendung von tracking Technologien zu. Klicken Sie auf „MEHR INFORMATIONEN“ unten für mehr Informationen und Anleitungen wie man Cookies und tracking Technologien abschaltet. Das Akzeptieren von Cookies und tracking Technologien ist zwar freiwillig, das Blockieren kann aber eine korrekte Ausführung unserer Website verhindern, und bestimmte Werbung könnte für Sie weniger relevant sein.
Ihr Datenschutz ist uns wichtig. Lesen Sie mehr über unsere Datenschutzrichtlinien hier.