When designing an embedded system with an MCU, which one should you pick? This guide provides you with a quick overview to help you narrow down your choices. A microcontroller (MCU), is the smallest and most basic computer. Running on a single chip, it has a CPU, memories (RAM and ROM), and interfaces (input/output ports) […]
LoRaWAN security design tips: Designing with a stand-alone security chip
With the growth of the Internet of Things, cyber attacks are increasing at an alarming rate (Figure 1). Key provisioning, a process of key generation and device authentication, is a critical part of establishing security. Whoever holds the key will be able to access the payloads, i.e. the valuable data stored in the application server(s). […]
Cybersecurity basics: Authentication and “key” management in LoRaWAN
In part 1, we described the process of providing end-to-end security and some of the challenges in achieving network security. In this installment, we will go over how authentication work to achieve end-to-end network security between the end devices and the application servers. Device authentication and key management Each LoRaWAN device is given a unique 128-bit […]
Cybersecurity basics: Server and end device relationship to LoRaWAN network, Part 1
Providing end-to-end security is the ultimate security goal of every wireless network. Each reported successful cyberattack serves as a reminder that achieving security is easier said than done. Let’s first examine the process. Most of us know about using strong passwords and encryption. The most vulnerable security component is key management during device activation and […]