伦伦影院午夜理伦片-日韩三级在线播放-免费在线黄色网址-91精品免费-日本一区二区三区精品-激情视频一区-亚洲精品欧美精品-久久av免费观看-亚洲视频自拍-日本一本不卡-操亚洲女人-尤物视频网站在线观看-一本一道精品欧美中文字幕-狠狠影视-久久久91精品国产一区二区三区

Security May Be the ‘Short Board” Restricting Development of IoT, and HED Takes the Lead To Become A Leader in the IoT Security Field

Source: 華大電子
 Release Time: 2020-04-22

According to the Buckets Effect, how much of a bucket filled with water, depends on the shortest piece on the sides of casks. IoT industry with access to 5G shows rapid growth, but the security would become the “short board” restricting its development.

 

For individual customers, the security protects their privacy against infringement when they use connected devices; for enterprise end users, the security holds them harmless against suffering immeasurable losses caused by hacker attacks; and for IoT service providers, the security means more trustworthy products and solutions. Simply put, the security cannot be overemphasized. Yet the reality is that the IoT industry is far from paying enough attention to security.

IoT devices, for instance, have only a simply default password when leaving the factory; for another example, manufacturers only use initial encryption method, and so on. Only in the past 2019, IoT security news emerged in endlessly-millions of IoT cameras were reported to have major vulnerabilities; a 14-year-old hacker was able to control up to 4,000 IoT devices, and there was also a security scandal about Ring, one of Amazon’s fire security products…

Based on this status quo, what security awareness should IoT enterprises establish? How can we safeguard the safety and reliability of IoT devices?

With these questions, the author had in-depth exchanges with Ma Jing, General Manager of Sales Center of CEC Huada Electronic Design Co., Ltd. under CEC. Ms. Ma believed that massive amounts of unsafe connected devices may cause physical accidents, and the security is becoming the key factor restricting the development of IoT. Meanwhile, the software alone can no longer meet the IoT security demand, so the industry urgently needs the hardware to address the security weakness.

Why is it said that “software alone can no longer meet the IoT security demand” ?

In the era of Internet, terminals are generally on the user side, and the connection between the device and the man is very close. With the IoT age coming, tens of billions of devices are widely deployed in every corner of the globe, and attackers can easily launch two types of attacks:

Local attack: Hackers can conduct a reverse analysis of IoT devices or obtain the codes and work mechanisms of devices through hardware and software, so as to launch remote network attacks on servers or IoT devices.



Remote attack: By way of example of man-in-the-middle attacks, hackers can eavesdrop on communication data of the IoT devices and the cloud, so as to analyze and obtain some sensitive data from interactive information.

The author noted that foreign media reported last April that a security research organization disclosed unprecedented security vulnerabilities of IoT cameras, covering more than 2 million surveillance cameras. These cameras use a P2P communication software component of iLnkP2P developed by a domestic manufacturer. This component contains two vulnerabilities. Among these, the iLnKP2P authentication vulnerability allows attackers to intercept the connection of the devices and perform man-in-the-middle attacks and remotely control devices for eavesdropping, passwords stealing and remote invasion.

This shows that the software alone cannot effectively protect the security of IoT devices. Considering these existing pain points, HED launched professional IoT security SE chips, providing higher security protection for the IoT through hardware.

“In having communications between the IoT device and the cloud, random numbers are often introduced to ensure that even the same data is not the same on the communication links,” said Ma Jing, “although the software can achieve this function, the random number algorithms conducted by the software leave data exposed to a greater risk of being cracked as a result of the big data analysis, while the hardware can generate random numbers in the true sense through thermal noise or chaos principle of semiconductors, greatly improving the security level of anti-tapping and anti-tampering. ”

Further, power consumption attacks are also common; to be specific, there is a difference in power consumption when the device calculates 0 or 1, and the hackers may use the difference in physical power consumption to conduct reverse reasoning of data. To settle this problem, the IoT security chips can remove the difference of power consumption information occurring in the calculation of data by devices, and also can interfere with data, effectively preventing hackers from obtaining calculated data.

HED’s SE security chips are far from merely encrypting data

“Encryption does not mean security, and security chips are not just cryptographic algorithms,” Ma Jing concluded, “security threats in IoT applications include both single product security, such as anti-copying boards, local data storage security, and device networking security, such as device identification, identity authentication, data encryption transmission and OTA security upgrade.” Therefore, as an originator of the concept “security chips” of IoT, HED summarizes the requirements of IoT security in the following four aspects: device identification, bi-directional identity authentication between the device and the cloud, encrypted data transmission and remote OTA security upgrade.

To meet above requirements, the IoT security should contain a safe environment, safe data protection and safe processing flow, all of which are indispensable. Based on this, HED’s SE security chips have three functions including sensitive information protection, data transmission encryption and identity authentication.

 

The security needs to be paid great attention to from one end to another end of IoT, and the security awareness needs to be cultivated and accumulated for years. This puts forward higher requirements for security service suppliers. Domestically, HED has been awarded “Prize of Most Influential Enterprise in IoT Security” for three consecutive years, showcasing its excellent strength in the security chip field.

Although the term “Internet of Things” was coined not long ago, all kinds of smart card devices belong to the IoT devices in a broad sense, and have long-term requirements on security. Therefore, HED has carried certain IoT security genes since its inception. By now, HED has become a global supplier of smart card security chips and also one of the largest security chip suppliers.

In addition, to correspond to international algorithms, China has launched cryptographic algorithms with independent intellectual property rights, which is generally known as Chinese cryptographic algorithms. Currently, HED has developed a variety of security chips supporting both international algorithms and Chinese cryptographic algorithms. Its product security has passed the certification of many third-party testing agencies and obtained security qualifications of China Cryptogram Certification Level 2, UnionPay Chip Security, EAL4+/EAL5+, etc.

What’s more, as an important hardware product, HED’s SE security chips have internal software support, including an operating system and a file system, among other systems, so as to meet security needs of different scenarios and businesses. By combination of hardware and software, the SE security chips can provide customers with tailored security services.

Of course, in addition to security, low power consumption is also a factor that IoT devices need to focus on. HED also developed the ultra-low-power consumption security chip, with its standby power consumption less than 1μA and its large operating power consumption not exceeding 10mA. This chip can meet higher requirements on standby power and operating power consumption which the IoT puts forward aiming at security chips.


Which fields should pay more attention to the IoT security?

The IoT, ranging so wide, develops at different rates in different industries and has different degrees of security requirements in subdivided fields. So, the IoT segments involving people’s life, property and privacy security desperately need the IoT security chips.



In the IoV field, smart cars, as a mobile IoT carrier, use a wide variety of technologies internally. This also means that they face greater information security risks. The Guideline for Developing National Internet of Vehicles Industry Standard System released by the Ministry of Industry and Information Technology of the People’s Republic of China and Standardization Administration of the People’s Republic of China at the end of 2017 lists the information security construction as an important part of the intelligent connected vehicles standard system. By now, HED’s SE security chips can not only provide various levels of information security protection for passenger vehicles, but also help the government effectively monitor whether automobile exhaust pollutants of commercial vehicles meet the “China VI Vehicle Emission Standards”, realizing the innovation application of IoV security chips. This is a milestone breakthrough for a Chinese chip supplier.

In the smart security field, China has built the world’s largest video monitoring network with years of efforts. However, the security situations of our smart safeguard systems are hardly optimistic. The Technical Requirements for Information Security of Video Surveillance Network System for Public Security (GB35114-2017), the technical standards established by China in respect of the information security of video surveillance network, were officially implemented in November 2018, becoming the technical basis for comprehensively improving information security in the field of public security video surveillance. So far, HED has developed the security chips conforming to specifications A/B/C of GB35114, providing safeguard for various security needs.

In the smart metering field, the metering industry has evolved from mechanical metering to smart IC card metering, and to the present IoT metering. While solving the functional issues in the smart, digital, and information aspects, IoT technologies are susceptible to serious security threats in terms of the network and information security. To respond to these serious security threats, HED works with partners to provide a complete set of IoT security solutions for the smart metering industry, so as to effectively protect the data security of IoT metering, keep the property and privacy security of users, and safeguard the healthy development of the smart metering industry.

Besides, HED’s SE security chips and its solutions are widely applied in smart home, smart door locks, etc, providing both security safeguard for products and anti-counterfeiting solutions for accessories and consumables.

The IoT security needs joint efforts

Only after a long-term continuous improvement and evolvement and joint efforts of the industry is IoT security safeguarded. HED, as a pioneer in the security chip field, has explored a set of effective solutions for the IoT security, but the maturity of this industry needs the concerted efforts made by all enterprises.

 

 

Fortunately, some enterprises and management agencies have become the “leaders” in the IoT security field, and the whole IoT industry is increasingly paying attention to the security. With this, the security is expected to be greatly improved.

At the industrial level, the 2019 China Cybersecurity Development White Paper released by CCID showed that the IoT security market size in China reached RMB 8.82 billion and hit an annual growth rate of 34.7% in 2018. According to Gartner, the expenditures of the IoT security are estimated to reach USD 3.1 billion by 2021. Therefore, how to settle the IoT security issues is one of main concerns of enterprises.

In terms of policies, since 2017, the Chinese laws and regulations have been promulgated one after another, such as the Cybersecurity Law of the People’s Republic of China, the Cryptography Law of the People’s Republic of China, the Regulations on Protection of Critical Information Infrastructure Security, and the Regulations on Classified Protection of Cybersecurity. This means that importance of security is constantly increasing and has become a key point which cannot be ignored at the policy level.

For sure, the IoT security willcertainly become more and more important in the future, so it’s high time that all the companies consider how to safeguard the product security before security issues exist out there.


Source: Internet of Things Think-tank

Share
  • toolbar
    Back to Top
精品少妇人妻一区二区黑料社区 | 精品国产伦一区二区三区 | 国产又粗又猛又爽又黄 | 乱h伦h女h在线视频 黑料网在线观看 | 国产欧美日韩在线 | 日本三级免费 | 婷婷午夜 | 久草视频免费在线观看 | 美女爆吸乳羞羞免费网站妖精 | gogogo日本免费观看电视剧的软件 | 国产一区二区 | 丁香婷婷激情 | 饥渴少妇伦色诱公 | 婷婷色网 | 猛1被调教成公厕尿便失禁网站 | 久久精品黄色 | 久久久久综合 | 老妇高潮潮喷到猛进猛出 | 一本一道久久a久久精品蜜桃 | 香蕉视频免费看 | 91在线精品秘密一区二区 | 无码人妻精品一区二区 | 亚洲精品视频在线播放 | 国产福利一区二区三区 | 波多野结衣久久 | 中文字幕第一区 | 日本一级大片 | 欧美色综合天天久久综合精品 | 91视频免费看 | 一区二区三区四区五区 | 亚洲色欲色欲www在线观看 | 久久综合影院 | 这里只有精品久久 | 国产精品815.cc红桃 | 日韩午夜剧场 | 亚洲码无人客一区二区三区 | 美女扒开尿口让男人桶 | 精品一区二区视频 | 七七久久 | 亚洲成人免费 | 日韩精品一区二区三区四区 | 国产欧美一区二区 | 午夜视频免费在线观看 | 日韩在线网址 | 黄色三极片| 大地资源在线观看免费高清版粤语 | 国精产品99永久一区一区 | 在线不卡视频 | 91超碰在线观看 | 人妻少妇被猛烈进入中文字幕 | 波多野结衣伦理 | 91精品国产成人观看 | 狠狠撸狠狠操 | www国产亚洲精品久久网站 | www国产视频| 亚洲精品午夜精品 | 在线视频一区二区 | 精品欧美一区二区三区久久久 | 91在线视频播放 | 国产1页 | 日韩在线成人 | 中文字幕色 | 亚洲一区欧美 | 国产一级二级三级 | 国产一级生活片 | 久久久美女 | 亚洲色图在线视频 | 97在线观看免费高清 | 久操免费视频 | 老妇高潮潮喷到猛进猛出 | 中文字幕在线观看不卡 | 精东影业一区二区三区 | 亚洲av毛片| 亚洲色图p | 壮汉被书生c到合不拢腿 | 日本免费网站 | 成人片免费看 | 久草手机在线 | 欧美日韩中文字幕 | 人妻无码中文久久久久专区 | 大尺度做爰呻吟舌吻情头 | 亚洲av激情无码专区在线播放 | 国产在线不卡 | 国产伦精品一区二区三区88av | 成年人小视频 | 日本一级黄 | 欧美黑人做爰爽爽爽 | 不卡的av电影 | 日韩精品区 | 97成人免费视频 | 91美女视频 | 天天艹夜夜艹 | 日韩性视频 | 欧美一级日韩一级 | 五月天婷婷丁香 | 精品人妻一区二区三区四区不卡 | 国产午夜无码视频在线观看 | 色噜噜视频 | 国产第二页 | 在线永久看片免费的视频 | 久久99精品久久久久久 | 一区二区在线视频 | 国产草草 | 久久久97 | 日本中文字幕在线播放 | 日本欧美视频 | 爱豆国产剧免费观看大全剧集 | 爆操白虎 | 国产欧美在线 | 成人一级毛片 | 国产一区二区三区四区在线观看 | 影音先锋成人 | 成人黄色录像 | 日韩av电影在线播放 | 天天插天天操 | 日本三级视频在线观看 | 人人看人人干 | 九九久久精品 | 抱着老师的嫩臀猛然挺进视频 | 久久av一区二区三区亚洲 | 青青国产视频 | 亚洲五月婷婷 | 1000部做爰免费视频 | 欧美在线观看一区二区 | 秋霞一区二区三区 | 成人黄色电影在线观看 | 亚洲一区二区视频 | 婷婷天堂 | 精品欧美一区二区三区久久久 | 91学生片黄| 亚洲一区在线观看视频 | 成人tv| 香蕉久久a毛片 | 日韩激情视频 | 国产成人久久 | 91成人免费版 | 中文字幕在线免费观看视频 | 日韩欧美亚洲 | 成人黄色一级片 | 日本激情网站 | 黄色91| 91蜜桃婷婷狠狠久久综合9色 | 成人黄色大片 | 国产精品国产精品国产专区不片 | 国产精品色呦呦 | 国产激情综合五月久久 | 久热在线视频 | 深夜福利网址 | 亚洲高清免费 | 日本做爰全过程免费看 | 国产一区二区三区视频在线观看 | 97精品人妻一区二区三区香蕉 | 亚洲精品999| 桃色av | 青青草免费在线观看 | 日韩无码电影 | 日韩一区二区三区在线 | 日韩av电影在线播放 | 亚洲av毛片 | 国产欧美精品一区二区 | 天天碰天天操 | 天天干夜夜干 | 51免费看成人啪啪片 | 浓精喷进老师黑色丝袜在线观看 | 一级片免费 | 国产小视频在线播放 | 精品9999| 国产精品国产成人国产三级 | 欧美激情视频一区二区 | 国产熟女高潮一区二区三区 | 一区二区三区在线播放 | 国产一区2区 | 日本一区二区三区在线播放 | 久久久精品一区二区 | 大咪咪dvd | 在线一级片 | 日本视频在线观看 | 国产精品一区二区三区四区 | 无码人妻精品一区二区三区温州 | 一级免费毛片 | 99亚洲欲妇 | 动漫艳母在线观看 | 红杏出墙记 | 国产黄色一级 | 成人精品国产 | 超碰91在线 | 久久亚洲电影 | 日本中文字幕在线观看 | 草莓香蕉视频 | 麻豆国产一区二区三区四区 | 亚洲一区二区在线 | 亚洲电影一区二区 | 亚洲欧美国产精品专区久久 | 一起操在线观看 | 欧美四区 | 风韵丰满熟妇啪啪区老熟熟女 | 在线观看国产精品入口男同 | 蜜桃久久久 | 亚洲精品www | 国产无码精品一区二区 | 亚洲字幕 | 毛片无码一区二区三区a片视频 | 在线看国产 | 国产真实乱人偷精品人妻 | 色综合av | 国产一区二区久久 | 超碰九七 | 久久另类ts人妖一区二区 | 97人妻精品一区二区三区免 | 蜜桃一区二区三区 | 国产精品久久久久久久久久 | 亚洲综人网 | 久久嫩草 | 在线观看免费观看在线 | 涩涩污| 亚洲色图校园春色 | 黄色小说免费观看 | 日韩视频一区 | 国产精品亚洲精品 | 亚洲熟妇av乱码在线观看 | 中文字幕在线观看视频www | 日韩福利视频 | 国产成人久久 | www.日韩av | 成年视频在线观看 | 日日夜夜精品视频 | 人妻无码中文久久久久专区 | 午夜久久久 | 亚洲精品免费看 | 久久久一区二区三区 | 成人99 | 国产成人在线观看 | 日批视频网站 | 大地资源影视在线播放观看高清视频 | 秋霞一区二区三区 | 大又大又粗又硬又爽少妇毛片 | 苏晴忘穿内裤坐公交车被揉到视频 | 天天拍天天干 | 国产三级在线观看 | 亚洲欧美一区二区三区在线 | 蜜桃av鲁一鲁一鲁一鲁俄罗斯的 | 欧美激情网址 | 超碰97在线免费观看 | 91在线 | 岛国大片在线观看 | 日韩一区二区三区四区五区 | 一区二区三区网站 | 国产又猛又黄又爽 | 欧美丰满一区二区免费视频 | 国产浮力影院 | 亚洲黄色大片 | 久久小视频 | 亚洲欧美视频 | 依人在线| 最好看的日本字幕mv视频大全 | 放几个免费的毛片出来看 | 久久精品99久久久久久久久 | 亚洲激情综合 | 欧美成人精品一区二区男人看 | 中文字幕一区二区人妻电影 | 成年人在线免费观看 | 外国一级片 | 国产又粗又长又大 | av在线播放网址 | 久久久福利 | 蜜桃成人无码区免费视频网站 | 成人超碰| 色呦呦视频 | 麻豆乱码国产一区二区三区 | 一区二区三区四区视频 | 四虎精品 | 成人免费av| 国产资源在线观看 | 国产自产21区 | 黄色91| av毛片| 中文字幕第一区 | 久久免费电影 | 青青草视频免费观看 | 日韩中文字幕视频 | 日韩不卡 | 久草免费福利视频 | 一区二区三区四区在线视频 | 久久久久久久亚洲 | 黄色片网站在线观看 | 日韩免费毛片 | 国产免费无码一区二区 | 人操人人 | 草草在线视频 | 欧美做受高潮 | 911精品国产一区二区在线 | 邻居少妇张开双腿让我爽一夜 | 久久99精品视频 | 美丽的姑娘观看在线播放 | 深夜激情网 | 国产福利视频在线观看 | 成年人免费在线视频 | 97精品在线 | 人人草人人干 | 日本www色| 欧美激情综合色综合啪啪五月 | 天堂av中文在线 | 国产99精品 | 日本丰满大乳奶做爰 | 99人妻碰碰碰久久久久禁片 | 免费色网站 | 日日摸夜夜| 亚洲天堂男人天堂 | 相亲对象是问题学生动漫免费观看 | 91婷婷 | 日日干视频 | 粗大黑人巨茎大战欧美成人免费看 | av一级片 | 免费视频国产 | 欧美影视 | 日本不卡一区二区三区 | 国内精品一区二区 | 日韩高清国产一区在线 | 99热国产在线 | 又色又爽 | 国产在线观看免费视频今夜 | 国产又黄又爽 | h片在线| 国产精品一二三四区 | 蜜臀一区二区三区 | 亚洲精品18在线观看 | av网址在线播放 | 九九久久99 | 日本人dh亚洲人ⅹxx | 中文字幕一二三 | 天堂网站 | 在线永久看片免费的视频 | 爱爱短视频 | 大地资源在线观看免费高清版粤语 | 四虎影库 | 欧美中文字幕在线观看 | 国产精品99久久久久久久久久久久 | 亚洲精品午夜精品 | 国产精品一区二区在线观看 | 亚洲视频免费观看 | 蜜臀av一区二区三区 | 伊人一区二区三区 | 尤物av在线 | 蜜桃精品一区二区三区 |