Threat-based Analysis Method for IoT Devices

By all accounts, Internet of Things (IoT) devices are forecasted to become ubiquitous.

These devices, powered by semiconductors, will make every imaginable process smart. From simply turning on a light to more complex processes such as outpatient care or factory control, IoT devices utilizing sensing, processing, and cloud connectivity will dramatically improve their efficiency. The applications are diverse, and their promise and impact are unbounded.

This paper offers a case study to determine the security requirements of a network-camera IoT device. This device is, by definition, already connected and is used widely in many applications, from cheap home webcams to complex industry systems. By defining the relevant threats against the network camera and determining the security objectives to defend against those threats, the security requirements for the device will be established. This paper also presents Cypress' PSoC® 6 MCU, based on Arm® technology, as a solution that meets these requirements. The methodology can be applied to other IoT devices as well.

 

Read Now

 

 

Latest News

Sorry, your filter selection returned no results.

We've updated our privacy policy. Please take a moment to review these changes. By clicking I Agree to Arrow Electronics Terms Of Use  and have read and understand the Privacy Policy and Cookie Policy.

Our website places cookies on your device to improve your experience and to improve our site. Read more about the cookies we use and how to disable them here. Cookies and tracking technologies may be used for marketing purposes.
By clicking “Accept”, you are consenting to placement of cookies on your device and to our use of tracking technologies. Click “Read More” below for more information and instructions on how to disable cookies and tracking technologies. While acceptance of cookies and tracking technologies is voluntary, disabling them may result in the website not working properly, and certain advertisements may be less relevant to you.
We respect your privacy. Read our privacy policy here