Securing IoT Devices can be Never-Ending

CATEGORIES : IoT, System Security/AUTHOR : Ron Wilson

“Mommy, Daddy … Why is the sky blue?” As you scramble for an answer that lies somewhere between a discussion of refraction in gasses and “Oh, look—a doggie!” you already know the response to whatever you say will be a horrifyingly sincere “But why?” And so on, until your patience lies in tatters at your […]

Learning from the Next-Gen Firewall

CATEGORIES : Data Center, IoT, System Security/AUTHOR : Ron Wilson

Torrents of packets will cascade into the data center: endless streams of data from the Internet of Things (IoT), massive flows of cellular network traffic into virtualized network functions, bursts of input to Web applications. And hidden in the cascades, far darker bits try to slip through: cyber attacks. They may seek to interfere with […]

No Safety without Security on the IoT

CATEGORIES : All, Data Center, IoT, System Security, Wireless/AUTHOR : Ron Wilson

We have reached the stage in the evolution of the Internet of Things (IoT) where two independent processes have become self-sustaining. The first—the creative process—has begun to uncover genuinely compelling applications. Beyond $40 internet lightbulbs, in-refrigerator Webcams, and toothbrushes with smartphone apps, systems developers are starting to see—and to prototype—applications at the convergence of smart […]

System Security: A Model from Medieval History

CATEGORIES : All, Embedded system, System Security/AUTHOR : Ron Wilson

As one security expert has said, system security is not a thing, it is a process. In our increasingly connected—and increasingly hostile—environment, security has become a continuous case of new attacks leading to new countermeasures, followed by more innovative new attacks, and so on. Just as the Cold War arms race sapped the resources of […]

Secure Embedded Systems: Digging for the Roots of Trust

CATEGORIES : All, System Architecture, System Security/AUTHOR : Ron Wilson

Many embedded designs absolutely have to work right. A malfunction could do unacceptable harm to persons or property. Until recently, this requirement has been addressed through careful design and hardware reliability: if the software and the logic are right and there are no hardware failures, the system will work. But today we live in the […]