• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • Automotive
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Resources
    • Covid-19
    • DesignFast
    • Ebooks / Tech Tips
    • EE Forums
      • EDABoard.com
      • Electro-Tech-Online.com
    • FAQs
    • 2020 LEAP Awards
    • Oscilloscope Product Finder
    • Podcasts
    • Webinars
    • White Papers
  • Videos
    • Teardown Videos
  • Lee’s Teardowns
    • Teardown Videos
  • Learning Center
  • 5G
  • Women in Engineering

Cloud connectivity in IoT, Part 2: How to secure data links

March 3, 2020 By Majeed Kamran

If the Internet of Things (IoT) is about connecting objects like a thermostat or a pacemaker to the Internet Protocol (IP)-based networks, then it’s even more about securing links to these objects. And that includes implementing security while connecting IoT devices to a cloud platform.

The good news is that securing links to the cloud is no more a drain for IoT developers. Traditionally, embedded designers required significant time and resources for creating cloud-connected applications. It included the necessary expertise in communication protocols, security, and hardware compatibility. That’s no more the case.

Again, like simplifying the communication links between IoT nodes and cloud, MCU suppliers are joining hands with cloud service providers to ensure that designing secure cloud-connected systems is no more an exhaustive process.

Here, it’s worth mentioning that the MCU-based hardware solutions can store unique device credentials, and they can connect IoT devices to the cloud much faster than software-only alternatives. Also, the software can be copied, reverse-engineered, and exploited with ease. On the other hand, the hardware-based solutions allow the identity of an IoT device to be programmed into the microcontroller chip at a secure factory location.

Figure 1: This is how an IoT device certificate is automatically transferred to a cloud platform and registered on the first connection. (Image: Microchip)

About TLS and wolfSSL

The communication links to the cloud often rely on protocols like Transport Layer Security (TLS) and Secure Socket Layer (SSL) to protect the confidentiality of messages. The TLS protocol and its predecessor, SSL protocol, are widely used to securely transfer the data between the client (IoT node) and the server (cloud computer) through authentication, encryption, and integrity mechanisms.

TLS, an Internet Engineering Task Force (IETF) standard for secure communication, is employed to secure HTTP communications over TCP-based links. Datagram Layer Transport Security (DLTS) performs similar functionality for the UDP links.

Though commonly known for encrypting data transport in accessing websites and other web applications, the security protocol’s TLS 1.2 version is becoming the de facto standard for connecting embedded systems to a network. That’s why cloud services such as AWS IoT require that the IoT device must authenticate itself during the TLS handshake using a device-specific authentication mechanism.

The IoT developers also commonly employ wolfSSL, a lightweight C-language-based SSL/TLS library, which is targeted at embedded, RTOS, and resource-constrained environments primarily because of its small size, speed, and portability features.

Figure 2: A view of secure and automatic enrollment of IoT devices using provisioning services for cloud platforms. (Image: Trustonic)

Hardware-based security

The TLS and SSL add encryption support to connections linking IoT devices to the cloud. However, while TLS 1.2 is undeniably robust, an embedded system still requires a unique, secure, and trusted identity to prevent remote attacks.

That’s where microcontrollers enter the IoT equation by providing a built-in hardware security engine to harden the TLS-based communications. They enable IoT devices to be hardened with strong cryptography and thus prevent malicious attacks from hackers and cybercriminals.

As compared to other security chips, MCUs offer design simplicity for securing cloud links due to fewer avenues of attack. The fact that code on MCUs runs “bare metal” and that MCUs include no intermediary operating system (OS) to execute instructions means that they have a limited number of potential attack vectors.

You may also like:


  • Cloud connectivity in IoT, Part 1: How communication works

  • The impacts of 5G on the future: A new era…

  • How zero-touch provisioning simplifies IoT links to cloud

Filed Under: FAQ, Featured, Microcontroller Tips Tagged With: FAQ

Primary Sidebar

EE Training Center Classrooms

“ee

“ee

“ee

“ee

Featured Resources

  • NEW! EE World Online Learning Center
  • CUI Devices – CUI Insights Blog
  • EE Classroom: Power Delivery
  • EE Classroom: Building Automation
  • EE Classroom: Aerospace & Defense
  • EE Classroom: Grid Infrastructure

Autonomous & Connected Vehicles 2019


RSS Current EDABoard.com discussions

  • PSoC1 programming
  • Kitchen balance load cells 10 kg
  • CLOCK DIVIDER
  • dsPIC33f ADC reading voltage help
  • Simulation of a board in CST

RSS Current Electro-Tech-Online.com Discussions

  • infrasonic frequency
  • Definitive Technology Subwoofer repair
  • Dust extractor remote switch
  • Best way to reverse a DC motor
  • Touch circuit sound, led. 555 timer

Oscilloscopes Product Finder

Follow EE World on Twitter

Tweets by @EEWorldOnline

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analog IC Tips
  • Connector Tips
  • Engineer's Garage
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • Wire & Cable Tips
  • 5G Technology World

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Lee's teardown videos
  • Advertise with us
  • Contact us
  • About Us
Follow us on TwitterAdd us on FacebookFollow us on YouTube Add us on Instagram

Copyright © 2021 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy