Understanding secure connectivity in embedded systems and IoT devices
This is a series of five videos that explains how secure network connectivity and secure remote updates work from the perspective of the underlying security technologies:
- The first video discusses security threats and some common attack methods, followed by several examples of actual attacks on embedded systems. This provides the viewer with the context as to why some of the security technologies are needed.
- The second video introduces fundamental digital security concepts: confidentiality, authenticity, and integrity. It then discusses hardware security features found on embedded microprocessors and microcontrollers and how these underpin the implementation of secure system software.
- The third video explains symmetric and asymmetric encryption and secure hashing and how these are used to deliver confidentiality, integrity, and authentication, as well as specific explanations of how digital signatures and key exchange work.
- The fourth video describes digital certificates, including certificate issuance and validation, their different uses in embedded/IoT applications, and how embedded/IoT devices store certificates.
- Having covered how the underlying security technologies work in the first four videos, the final video walks through common embedded/IoT software functions and shows how commonly-implemented embedded/IoT software uses the previously described security technologies in real implementations. The software functions described include establish a secure network connection with SSL/TLS, performing a secure remote update, and secure run-time provisioning.