You are here

Why IoT Security Matters, and Who Can Help? | Cypress Semiconductor

Why IoT Security Matters, and Who Can Help?

By Kevin Tran – AWS Sr. Partner Development Manager at Amazon and Gary Sugita, ICW Director of Marketing at Cypress, an Infineon Technologies Company

In this blog series, we’ll explore the hardware and software conditions that make IoT security unique, and what it takes to secure a smart IoT device using our technology.

It wasn’t that long ago when a refrigerator was just a refrigerator, and a car was nothing more than a mode of personal transportation. Just 10 years ago, there weren’t many people who were thinking of a car as a “living rooms on wheels,” or giving thought to the idea that one day a refrigerator might be “smart” enough to order supplies for itself.

Yet that is where technology has taken us. The wonder of reliable and ubiquitous connectivity has given rise to the world of “smart,” where one day we may be celebrating our appliances’ performance milestones with graduation yard signs.

But for all the benefits associated with the IoT that make life easier and more enjoyable comes some greater level of risk to one’s personal safety and security. In 2018, for example, hackers took control of a baby-monitoring camera at a home in Seattle and threatened to kidnap the child. Similar incidents have occurred in South Carolina, Minnesota, Michigan, and Arizona, leaving parents and their kids feeling vulnerable. There are many other cases of connected equipment being compromised by bad actors, including portable medical devices, factory robots, and home appliances.

Earlier this year, the California Consumer Privacy Act (SB-237) was launched, requiring manufacturers to provide some level of security in devices they sell. At least nine other states are working on similar legislation. The EU and European Telecommunications Standards Institute (ETSI) also have active initiatives to address cybersecurity and consumer privacy. In short, data breaches may not only permanently harm a manufacturer’s brand reputation, but also cost millions of dollars in fines.

Security is not a new concept to electronic devices. Most smart phones have processors that provide device security. Most computers have built-in security as well, including a Trusted Platform Module (TPM) on the motherboard that prevents tampering. But many other electronic products in use today were not originally designed to be connected, and therefore don’t have embedded security. The challenge for IoT equipment makers today is to bring these resource-constrained products up to the security standards of their connected counterparts.

Some vendors like Cypress, an Infineon Technologies company, are helping manufacturers build security into their connected products. Working with our cloud partner, Amazon Web Services (AWS), the company delivers an out-of-the-box security solution that provides end-to-end protection, from node to cloud and back. Using open-source security firmware along with integrated communication stacks on the PSoC 64 secure MCU, vendors can bring their secure IoT products to market quickly and cost-effectively.

In this blog series, we will explore the hardware and software conditions that make IoT security unique, what it takes to secure a smart IoT device using a secure MCU like PSoC 64, how to securely connect one IoT device to the AWS Cloud, and then how to scale your AWS cloud connections to one million devices or more.

About the Authors:

Gary Sugita is Director of Marketing in the IoT Compute and Wireless business unit at Cypress Semiconductor Corporation, an Infineon Technologies company. Over the last 30 years, Gary has held various marketing and technical roles in embedded systems. He holds a bachelor’s degree in electrical engineering from Santa Clara University.

Kevin is a Strategic Partner Development Manager for the AWS Partner Network (APN) team and is responsible for driving the adoption of AWS Edge and IoT Services with hardware Partners. Over the past 20 years, Kevin has developed ecosystems with partners to champion the adoption of leading edge semiconductor technologies for the networking and automotive industries. He has a bachelor’s degree in Electrical Engineering from the California State University San Jose.

본 사이트의 모든 컨텐츠와 자료는 "있는 그대로" 제공됩니다. CYPRESS SEMICONDUCTOR와 해당 공급자는 그 목적에 관계 없이 이러한 자료의 적합성에 대한 표현을 하지 않으며 상업성, 특정 목적에의 적합성, 권리 및 제3자 지적 재산권의 비침해에 대한 모든 묵시적 보증과 조건을 포함하여(이에 제한되지 않음) 이러한 자료와 관련한 모든 보증과 조건을 부인합니다. CYPRESS SEMICONDUCTOR에서는 명시적 또는 묵시적으로 금반언이나 여타의 다른 방법으로 라이센스를 부여하지 않습니다. 이 사이트의 정보를 사용하려면 제3자의 라이센스 또는 CYPRESS SEMICONDUCTOR에서 제공하는 라이센스가 필요할 수 있습니다.

이 사이트의 컨텐츠에는 특정 사용 지침이나 제한이 포함되거나 그러한 제한이 적용될 수 있습니다. 모든 게시물과 이 사이트 컨텐츠 사용에는 사이트 약관이 적용됩니다. 이 컨텐츠를 사용하는 제3자는 제한 또는 지침을 따르고 이 사이트의 약관을 준수할 것이라는 데 동의합니다. Cypress Semiconductor와 그 공급자는 컨텐츠와 자료, 그 제품, 프로그램 및 서비스를 언제든 수정, 삭제, 개조, 개선, 향상 및 기타 변경하거나 예고 없이 컨텐츠, 제품, 프로그램 또는 서비스를 이동 또는 중단할 수 있는 권리를 보유합니다.