HomeNewsIndia NewsSecuring Smart Devices from Hackers and Cyber Criminals

    Securing Smart Devices from Hackers and Cyber Criminals

    With the advancements in computing and connectivity, electronic devices can be connected to other devices or networks to operate interactively and autonomously in different environments to leverage expanding opportunities. These are smart devices with microcontrollers and embedded software that can operate on personal or business critical information which poses privacy and security risks to consumers.

    Smart devices play a crucial role in the systems used by today’s connected world. Hence, these are the target of adversaries to carry out malicious operations. The attackers who exploit the smart devices could be amateurs, ethical hackers or criminal organizations. Security risks in mobility and health care systems can be detrimental to business and life. So securing these devices becomes of utmost importance now.

    In order to realise the required security, cryptography provides various algorithms and protocols. They address the needs for authorized access, authenticity, confidentiality and integrity of crucial data and functionality of the system. Security algorithms based on obscurity are of one type whereas in the other type, security algorithms are openly available. Open security algorithms rely on secret information called keys, and the ability of the platform to protect the keys and any information involved in processing of the algorithm that can be used to deduce the keys.

    The security of a system is as strong as the weakest link in a chain. So, the security measures shall include the entire system development phase with Root of Trust (RoT) spanning the entire solution. Software alone cannot provide RoT as it can easily be analysed, modified and copied. Hardware-based RoT at the system level allows balancing of the security requirements between software and hardware. In addition, hardware of the device must be tamper resistant so it does not allow access to the physical hardware components. It should also include cryptographic coprocessors for carrying out complicated computations of algorithms securely without compromising on performance.

    Further, the level of security claims for each smart device and the security processes involved in its development are to be affirmed through certification process carried by competent bodies through rigorous verification at their accredited security labs.

    Because of the proven trust, products from Infineon are deployed in systems that provide secure transactions in payment, mobility, telecommunications, computing and government ID sectors.

    To conclude, vulnerability in any component of the smart device– hardware, firmware, and operating system can compromise the trustworthiness of security mechanisms on which critical applications rely. So, these components must include security mechanisms right from the conceptualization stage and must be certified by third-party security evaluation laboratories to serve as RoT for connected world applications.

    ELE Times Bureau
    ELE Times Bureauhttps://www.eletimes.ai/
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Related News

    Must Read

    What is Fashion Tech? Providing New Product Value and Customer Experiences with Technology

    Courtesy: Murata Electronics What is fashion tech? - diverse technologies...

    Emergency Screaming Detection: How AI Recognizes Human Screams and Saves Lives

    Courtesy: Renesas Detecting human screams for help is important in...

    India’s Electronics Push: Ambition Is Clear. Execution Will Decide the Outcome

    India’s electronics story has entered a decisive phase. The...

    India on the Road to Semicon Self-Reliance with Three More Plants

    India to welcome three more semiconductor plants after PM...

    Upcoming years to Bring Boom for Semiconductors and Electronics

    Union Minister for Electronics and Information Technology Ashwini Vaishnaw...

    R&S Propels 6G Readiness With FR1–FR3 Carrier Demonstration

    Rohde & Schwarz and Qualcomm Technologies, Inc. have reached...

    ROHM and Suchi Semicon Establish a Strategic Semicon Manufacturing Partnership in India

    ROHM and Suchi Semicon have announced the establishment of...

    Keysight to Demonstrate NR-NTN devices Mobility Testing at MWC 2026 in Collaboration with Samsung

    Keysight Technologies, Inc. will demonstrate lab-based validation of new...

    ROHM Strengthens Supply Capability for GaN Power Devices

    Combining TSMC’s Process Technology to Build an End-to-End, In-Group...