伦伦影院午夜理伦片-日韩三级在线播放-免费在线黄色网址-91精品免费-日本一区二区三区精品-激情视频一区-亚洲精品欧美精品-久久av免费观看-亚洲视频自拍-日本一本不卡-操亚洲女人-尤物视频网站在线观看-一本一道精品欧美中文字幕-狠狠影视-久久久91精品国产一区二区三区

Security May Be the ‘Short Board” Restricting Development of IoT, and HED Takes the Lead To Become A Leader in the IoT Security Field

Source: 華大電子
 Release Time: 2020-04-22

According to the Buckets Effect, how much of a bucket filled with water, depends on the shortest piece on the sides of casks. IoT industry with access to 5G shows rapid growth, but the security would become the “short board” restricting its development.

 

For individual customers, the security protects their privacy against infringement when they use connected devices; for enterprise end users, the security holds them harmless against suffering immeasurable losses caused by hacker attacks; and for IoT service providers, the security means more trustworthy products and solutions. Simply put, the security cannot be overemphasized. Yet the reality is that the IoT industry is far from paying enough attention to security.

IoT devices, for instance, have only a simply default password when leaving the factory; for another example, manufacturers only use initial encryption method, and so on. Only in the past 2019, IoT security news emerged in endlessly-millions of IoT cameras were reported to have major vulnerabilities; a 14-year-old hacker was able to control up to 4,000 IoT devices, and there was also a security scandal about Ring, one of Amazon’s fire security products…

Based on this status quo, what security awareness should IoT enterprises establish? How can we safeguard the safety and reliability of IoT devices?

With these questions, the author had in-depth exchanges with Ma Jing, General Manager of Sales Center of CEC Huada Electronic Design Co., Ltd. under CEC. Ms. Ma believed that massive amounts of unsafe connected devices may cause physical accidents, and the security is becoming the key factor restricting the development of IoT. Meanwhile, the software alone can no longer meet the IoT security demand, so the industry urgently needs the hardware to address the security weakness.

Why is it said that “software alone can no longer meet the IoT security demand” ?

In the era of Internet, terminals are generally on the user side, and the connection between the device and the man is very close. With the IoT age coming, tens of billions of devices are widely deployed in every corner of the globe, and attackers can easily launch two types of attacks:

Local attack: Hackers can conduct a reverse analysis of IoT devices or obtain the codes and work mechanisms of devices through hardware and software, so as to launch remote network attacks on servers or IoT devices.



Remote attack: By way of example of man-in-the-middle attacks, hackers can eavesdrop on communication data of the IoT devices and the cloud, so as to analyze and obtain some sensitive data from interactive information.

The author noted that foreign media reported last April that a security research organization disclosed unprecedented security vulnerabilities of IoT cameras, covering more than 2 million surveillance cameras. These cameras use a P2P communication software component of iLnkP2P developed by a domestic manufacturer. This component contains two vulnerabilities. Among these, the iLnKP2P authentication vulnerability allows attackers to intercept the connection of the devices and perform man-in-the-middle attacks and remotely control devices for eavesdropping, passwords stealing and remote invasion.

This shows that the software alone cannot effectively protect the security of IoT devices. Considering these existing pain points, HED launched professional IoT security SE chips, providing higher security protection for the IoT through hardware.

“In having communications between the IoT device and the cloud, random numbers are often introduced to ensure that even the same data is not the same on the communication links,” said Ma Jing, “although the software can achieve this function, the random number algorithms conducted by the software leave data exposed to a greater risk of being cracked as a result of the big data analysis, while the hardware can generate random numbers in the true sense through thermal noise or chaos principle of semiconductors, greatly improving the security level of anti-tapping and anti-tampering. ”

Further, power consumption attacks are also common; to be specific, there is a difference in power consumption when the device calculates 0 or 1, and the hackers may use the difference in physical power consumption to conduct reverse reasoning of data. To settle this problem, the IoT security chips can remove the difference of power consumption information occurring in the calculation of data by devices, and also can interfere with data, effectively preventing hackers from obtaining calculated data.

HED’s SE security chips are far from merely encrypting data

“Encryption does not mean security, and security chips are not just cryptographic algorithms,” Ma Jing concluded, “security threats in IoT applications include both single product security, such as anti-copying boards, local data storage security, and device networking security, such as device identification, identity authentication, data encryption transmission and OTA security upgrade.” Therefore, as an originator of the concept “security chips” of IoT, HED summarizes the requirements of IoT security in the following four aspects: device identification, bi-directional identity authentication between the device and the cloud, encrypted data transmission and remote OTA security upgrade.

To meet above requirements, the IoT security should contain a safe environment, safe data protection and safe processing flow, all of which are indispensable. Based on this, HED’s SE security chips have three functions including sensitive information protection, data transmission encryption and identity authentication.

 

The security needs to be paid great attention to from one end to another end of IoT, and the security awareness needs to be cultivated and accumulated for years. This puts forward higher requirements for security service suppliers. Domestically, HED has been awarded “Prize of Most Influential Enterprise in IoT Security” for three consecutive years, showcasing its excellent strength in the security chip field.

Although the term “Internet of Things” was coined not long ago, all kinds of smart card devices belong to the IoT devices in a broad sense, and have long-term requirements on security. Therefore, HED has carried certain IoT security genes since its inception. By now, HED has become a global supplier of smart card security chips and also one of the largest security chip suppliers.

In addition, to correspond to international algorithms, China has launched cryptographic algorithms with independent intellectual property rights, which is generally known as Chinese cryptographic algorithms. Currently, HED has developed a variety of security chips supporting both international algorithms and Chinese cryptographic algorithms. Its product security has passed the certification of many third-party testing agencies and obtained security qualifications of China Cryptogram Certification Level 2, UnionPay Chip Security, EAL4+/EAL5+, etc.

What’s more, as an important hardware product, HED’s SE security chips have internal software support, including an operating system and a file system, among other systems, so as to meet security needs of different scenarios and businesses. By combination of hardware and software, the SE security chips can provide customers with tailored security services.

Of course, in addition to security, low power consumption is also a factor that IoT devices need to focus on. HED also developed the ultra-low-power consumption security chip, with its standby power consumption less than 1μA and its large operating power consumption not exceeding 10mA. This chip can meet higher requirements on standby power and operating power consumption which the IoT puts forward aiming at security chips.


Which fields should pay more attention to the IoT security?

The IoT, ranging so wide, develops at different rates in different industries and has different degrees of security requirements in subdivided fields. So, the IoT segments involving people’s life, property and privacy security desperately need the IoT security chips.



In the IoV field, smart cars, as a mobile IoT carrier, use a wide variety of technologies internally. This also means that they face greater information security risks. The Guideline for Developing National Internet of Vehicles Industry Standard System released by the Ministry of Industry and Information Technology of the People’s Republic of China and Standardization Administration of the People’s Republic of China at the end of 2017 lists the information security construction as an important part of the intelligent connected vehicles standard system. By now, HED’s SE security chips can not only provide various levels of information security protection for passenger vehicles, but also help the government effectively monitor whether automobile exhaust pollutants of commercial vehicles meet the “China VI Vehicle Emission Standards”, realizing the innovation application of IoV security chips. This is a milestone breakthrough for a Chinese chip supplier.

In the smart security field, China has built the world’s largest video monitoring network with years of efforts. However, the security situations of our smart safeguard systems are hardly optimistic. The Technical Requirements for Information Security of Video Surveillance Network System for Public Security (GB35114-2017), the technical standards established by China in respect of the information security of video surveillance network, were officially implemented in November 2018, becoming the technical basis for comprehensively improving information security in the field of public security video surveillance. So far, HED has developed the security chips conforming to specifications A/B/C of GB35114, providing safeguard for various security needs.

In the smart metering field, the metering industry has evolved from mechanical metering to smart IC card metering, and to the present IoT metering. While solving the functional issues in the smart, digital, and information aspects, IoT technologies are susceptible to serious security threats in terms of the network and information security. To respond to these serious security threats, HED works with partners to provide a complete set of IoT security solutions for the smart metering industry, so as to effectively protect the data security of IoT metering, keep the property and privacy security of users, and safeguard the healthy development of the smart metering industry.

Besides, HED’s SE security chips and its solutions are widely applied in smart home, smart door locks, etc, providing both security safeguard for products and anti-counterfeiting solutions for accessories and consumables.

The IoT security needs joint efforts

Only after a long-term continuous improvement and evolvement and joint efforts of the industry is IoT security safeguarded. HED, as a pioneer in the security chip field, has explored a set of effective solutions for the IoT security, but the maturity of this industry needs the concerted efforts made by all enterprises.

 

 

Fortunately, some enterprises and management agencies have become the “leaders” in the IoT security field, and the whole IoT industry is increasingly paying attention to the security. With this, the security is expected to be greatly improved.

At the industrial level, the 2019 China Cybersecurity Development White Paper released by CCID showed that the IoT security market size in China reached RMB 8.82 billion and hit an annual growth rate of 34.7% in 2018. According to Gartner, the expenditures of the IoT security are estimated to reach USD 3.1 billion by 2021. Therefore, how to settle the IoT security issues is one of main concerns of enterprises.

In terms of policies, since 2017, the Chinese laws and regulations have been promulgated one after another, such as the Cybersecurity Law of the People’s Republic of China, the Cryptography Law of the People’s Republic of China, the Regulations on Protection of Critical Information Infrastructure Security, and the Regulations on Classified Protection of Cybersecurity. This means that importance of security is constantly increasing and has become a key point which cannot be ignored at the policy level.

For sure, the IoT security willcertainly become more and more important in the future, so it’s high time that all the companies consider how to safeguard the product security before security issues exist out there.


Source: Internet of Things Think-tank

Share
  • toolbar
    Back to Top
欧美福利电影 | 日本大尺度做爰呻吟 | 日韩不卡一区二区 | 91久久国产综合久久 | 国产黄色免费 | 欧美日韩亚洲综合 | 91在线影院| aaa黄色片 | 超碰人人在线 | 在线看片你懂的 | 少妇被按摩师摸高潮了 | 无码人妻丰满熟妇精品 | 97色婷婷| 强行糟蹋人妻hd中文字幕 | 免费网站观看www在线观看 | 精品一区二区三区三区 | 午夜看看 | 亚洲精品97久久中文字幕无码 | 日本中文在线 | 美女爆吸乳羞羞免费网站妖精 | 国语对白做受69 | 亚洲激情图 | 成人黄网免费观看视频 | 亚洲四区| 99人妻碰碰碰久久久久禁片 | 日本欧美久久久久免费播放网 | 超级砰砰砰97免费观看最新一期 | 713电影免费播放国语 | 免费毛片视频 | 草草影院在线观看 | 久久中文字幕视频 | 韩国三级在线播放 | 日本理伦片午夜理伦片 | 72种无遮挡啪啪的姿势 | 污污视频在线看 | 亚洲欧美高清 | 亚洲精品国产精品国自产观看浪潮 | 中国白嫩丰满人妻videos | 亚洲精品福利视频 | 超级砰砰砰97免费观看最新一期 | 小珊的性放荡羞辱日记 | 亚洲影音| 欧美日韩亚洲一区 | 国产精品91视频 | 人人干人人草 | 国产视频一区在线 | 久久久高清 | 婷婷久久久 | 天天夜夜操 | 欧美手机在线 | 亚洲一区免费 | 亚洲视频免费在线观看 | 亚洲精品乱码久久久久久蜜桃欧美 | 中文字幕专区 | 91老师国产黑色丝袜在线 | 久久无码人妻精品一区二区三区 | 国产a久久麻豆入口 | 国产高清视频在线观看 | 欧美日韩视频 | 国产一卡二卡三卡 | 国产在线观看网站 | 黄色av免费看 | 91视频在线观看 | 四虎在线播放 | 美女啪啪网站 | 丁香激情网 | 黄色中文字幕 | 精品国产va久久久久久久 | 欧美精品一级 | 国产一级在线观看 | 无码国产精品一区二区高潮 | 国产老头和老头xxxx× | 麻豆激情视频 | 国产绿帽刺激高潮对白 | 亚洲综合五月天婷婷丁香 | 欧洲精品码一区二区三区免费看 | 蜜臀久久99精品久久久 | 在线观看免费 | 亚洲一区二区在线视频 | 亚洲熟女乱综合一区二区三区 | www.黄色 | 五十路在线 | 四虎av在线 | 操操操操操操 | 麻豆视频在线观看 | 激情国产 | 亚洲福利在线观看 | 91在线免费播放 | 99热精品在线观看 | 毛片一区二区 | 在线观看中文字幕 | 乖乖女的野男人们np | 99精品视频在线 | 在线观看污 | 欧美又粗又大aaa片 国产精品美女高潮无套 | 91网站免费观看 | 给我看免费高清在线观看 | 日韩免费视频一区二区 | 欧美色图一区 | 精品国产乱码久久久久久蜜柚 | 日本理论片午伦夜理片在线观看 | 大尺度做爰呻吟舌吻网站 | 亚洲综合在线视频 | 一区二区三区国产精品 | 国产一区在线视频 | 国产精品久久久久久久9999 | 国产激情综合五月久久 | 婷婷六月天| 97在线免费视频 | 色中文字幕 | 狠狠的操 | 国产免费一区二区三区 | 尤物视频在线播放 | 亚洲人在线 | 偷拍亚洲 | 国产卡一卡二 | 国产精品激情 | 色一区二区三区 | 麻豆国产91在线播放 | 欧美日韩精品在线观看 | 国产视频a | 911视频高清完整版在线观看 | 国产精品一卡二卡 | 麻豆久久久 | 欧美18免费视频 | 日韩激情av | 久久福利电影 | 黄色美女视频网站 | 在线天堂视频 | 国产福利av | 日本精品久久久 | 国产熟女一区二区三区五月婷 | 午夜福利电影 | 国产卡一卡二 | 天天爽天天爽 | 人妖网站 | 国产午夜精品福利 | 尤物videos另类xxxx | 日韩激情在线观看 | 亚洲爱爱网 | 亚洲精品一区二区三区新线路 | 成人性生交大全免 | 亚洲一区av | 国产成人av | 深夜福利影院 | 最新日韩av| 日韩在线视频免费 | 国产精品一二三区 | 亚洲在线免费 | 国产精品视频网 | 日本三级日本三级日本三级极 | 青青草视频在线观看 | 日韩无码精品一区二区 | 波多野结衣视频网站 | gogogo日本免费观看电视剧_第17集 | 91麻豆精品秘密入口 | 四虎8848精品成人免费网站 | 国产高清视频在线观看 | 91精品国产麻豆国产自产在线 | 日本中文字幕一区 | 狠狠干在线视频 | 国产欧美日韩一区二区三区 | 欧美人妻日韩精品 | 久操视频在线播放 | 少妇在线观看 | 51免费看成人啪啪片 | 少妇被狂c下部羞羞漫画 | 天天色天天 | 强辱丰满人妻hd中文字幕 | 少妇一区二区三区 | 欧亚乱熟女一区二区在线 | 四虎影视在线 | 国产乱人乱偷精品视频 | 欧美激情综合 | 天天看天天操 | 四虎国产 | 这里只有精品视频 | 波多野结衣电影在线播放 | 久久久久999| 国产精品国产成人国产三级 | 韩国黄色一级片 | 91免费观看网站 | 男人天堂亚洲 | 日韩一区二区视频 | av免费观看网站 | 日日骚av| 午夜在线 | www.黄色网| 亚洲中出 | 亚洲另类av | 精品综合 | 免费毛片基地 | 男人操女人的软件 | 成人短视频在线观看 | 美女黄色免费网站 | 国产一卡二卡 | 亚洲成人久久久 | 免费观看av | 久久久一区二区三区 | 91青青草| 久草视频免费在线 | 蜜桃网站| 一本大道东京热无码 | 欧美成人一区二区 | 久久久久久久久久久久久久久久久 | 久久精品在线观看 | 18做爰免费视频网站 | 中文久久| 成年人免费在线视频 | 羞羞动漫在线观看 | 伊人久操 | 日批视频免费观看 | 欧美少妇视频 | 青娱乐青青草 | 91久久久久 | 厨房性猛交hd | 五月婷婷色 | 精品视频一区二区 | 欧美精品一区二区三区四区 | 日韩视频在线播放 | 日韩一级在线 | 91在线精品李宗瑞 | 成人av一区二区三区 | 日本精品一区二区三区四区的功能 | 青青草成人在线 | 哺乳期喷奶水丰满少妇 | 精品久久久久久久 | 国产精品久久777777 | 久久蜜臀 | 在线观看的av | 久久69 | 成人高潮片免费视频 | 91看视频 | 日本一区二区在线视频 | 日本xxxxxⅹxxxx69 | 伊人亚洲 | 欧美日韩在线视频观看 | 久久成人精品 | 宝贝乖~胸罩脱了让我揉你的胸 | 一级黄色网址 | 调教撅屁股啪调教打臀缝av | 欧美三级视频在线观看 | 99久久婷婷国产综合精品草原 | 一本色道久久综合狠狠躁的推荐 | 免费成人毛片 | 日本少妇裸体做爰 | 亚洲欧美天堂 | 成人在线视频网站 | 国产精品午夜福利 | 亚洲三级电影 | 两口子交换真实刺激高潮 | 九九视频在线 | 久久亚洲电影 | 日本在线免费观看视频 | 国产精品一区二 | 天天色播 | 99热在线免费观看 | 国产精品无码在线播放 | 国产18照片色桃 | 99精品久久久久久 | 一区二区三区高清 | 亚洲国产一区二区三区 | 在线观看国产精品入口男同 | 黄色av免费观看 | 欧美成人激情 | 国产剧情自拍 | 黄色网页在线观看 | 亚洲另类色图 | 做爰视频| 在线视频一区二区 | 成年人视频网站 | 国产精品久久一区 | 日韩无码精品一区二区 | 涩涩视频在线观看 | 国产精品中文 | 手机免费av| 国语播放老妇呻吟对白 | 国产老女人乱淫免费 | 在线网址你懂的 | 爱爱免费网站 | 操日本美女 | 久久久少妇 | 日本一区二区不卡视频 | 国产成人免费观看 | 久久国产免费 | 丁香花完整视频在线观看 | 水果派av解说 | 中文字幕在线视频观看 | 亚洲精品小视频 | 天堂va蜜桃一区二区三区 | 国产真实乱人偷精品人妻 | 国产福利在线视频 | 黄色大片免费看 | 欧美日本在线 | 一本色道久久综合亚洲精品小说 | 91麻豆精品秘密入口 | 国产免费黄色 | 国产黄色在线播放 | 在线视频一区二区三区 | 久久久久久久久久久久久久久久久久 | 麻豆回家视频区一区二 | 欧美一本| 蜜桃做爰免费网站 | 国精产品99永久一区一区 | 免费国产视频 | 91视频免费 | 久久久精品免费 | 国产精品偷乱一区二区三区 | 今天高清视频在线观看 | 国产一区二区三区四区 | 永久免费av| 精品国产人妻一区二区三区 | 日韩电影免费在线观看中文字幕 | 欧美巨鞭大战丰满少妇 | 五月网站 | 在线免费看黄网站 | 四虎8848精品成人免费网站 | 手机av网站 | 毛片视频免费观看 | 久久亚洲电影 | 91亚洲精品乱码久久久久久蜜桃 | 日韩五码 | 秋霞一区二区三区 | 国产欧美一区二区 | 狗爬女子的视频 | 精品人妻二区中文字幕 | 抱着老师的嫩臀猛然挺进视频 | 91久久久久 | 久久精选 | 国产黑丝在线 | 日韩一区二 | 在线成人免费视频 | www国产亚洲精品久久网站 | 亚洲精品一二区 | 青青草伊人 | www 在线观看视频 | 成年人小视频 | 成人性爱视频在线观看 | 国产中文字幕在线 | 91老师片黄在线观看 | 色豆豆| 女人裸体又黄 | 911精品国产一区二区在线 | 四虎在线播放 |