The Challenge Of Updating Cars


News stories about automotive hacking are becoming more common, and so is the concern about how to curb this problem. Security has become a new layer of system design complexity, and it's being taken increasingly seriously in a market that until very recently largely ignored it. That attitude is changing rapidly though, particularly with the advent of autonomous and connected vehicles. Secu... » read more

The Rise Of Dynamic Networks


The Internet of the future, and particularly the [getkc id="260" comment="Internet of Everything"], will be interlaced with millions if not billions of intelligent, dynamic, self-organizing networks. These networks will be full of elements that are capable of autonomic self-registration across these multitudes of networks. It is one thing to put up a security perimeter when you know who the... » read more

Security Made Easier


The FIDO (Fast IDentity Online) Alliance was formed in July 2012 to address the lack of interoperability among strong authentication devices as well as the problems users face with creating and remembering multiple usernames and passwords. The FIDO Alliance’s mission is to change the landscape of authentication by eliminating the reliance on passwords. This is accomplished by developing speci... » read more

A Primer For The 802.XX Physical Layer


This is the second installment of the 802.XX for the IoE series of articles. The first one was published in the August issue and addressed the Media Access Control (MAC) layer. In this article, we will examine the elements of the physical (PHY) layer of the 802.11 protocol stack. For reference, the protocol stack is shown in figure 1. The best designs, like everything else, are built on a so... » read more

Rising Threats From Differential Power Analysis


Differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. It was discovered around the mid 1990s by the teams at [getentity id="22671" e_name="Rambus"]’ Cryptography Research Division, and turned out to be a very effective tool for compromising the ubiquitous SIM card environment. “The most traditional market for DPA has been with smart cards... » read more

Can Cars Be Hack-Proof?


Not many days go by when there isn't a news headline describing the latest hacking attempt — or success — of an automobile or automotive system. Malicious hacking has been around almost since the dawn of connected electronics, but it's happening with increasing sophistication in the automotive sector. Even high-end vehicles suffer security flaws that are too costly or not worthwhile to f... » read more

Lightweight Cryptography For The IoE


This is the age where technology is expected to do more, faster, anonymously, and often invisibly. And it's supposed to use less power, with smaller footprints, unobtrusively and intuitively. And all that needs to be protected with cryptography. That's the goal, at least. But as Simon Blake-Wilson, vice president of products and marketing for [getentity id="22671" e_name="Rambus"]' Cryptogra... » read more

802.XX And The IoE


Ever since the first 802.11 standard was published in 1997, it has evolved to become the de facto protocol for much of the wireless networking across a wide range of devices and implementations. Today the protocol family includes 802.b 802.11a, 802.11g, 802.11n, and 802.11ac, respectively. Some of these will play a very important role in the IoE. There are other 802.xx protocols (such as 802.15... » read more

The Deep And Dark Webs


From time to time we hear a snippet or two about the “other” Web – the dark side of the Internet and the Web. For the most part, until something happens that brings the activity within that arena to the surface (such as the recent Silk Road exposure where anything was available for a price), that segment quietly hums along. But that is about to change. Once the IoE evolution gets tract... » read more

How Much Security Is Enough?


Semiconductor Engineering sat down to discuss the current state of [getkc id="223" kc_name="security"] and what must be done in the future, with Denis Noël, head of cyber security solutions at [getentity id="22499" e_name="NXP"]; Serge Leef, vice president of new ventures at [getentity id="22017" e_name="Mentor Graphics"]; Andreas Kuehlman, senior vice president and general manager of the soft... » read more

← Older posts Newer posts →