久久久香蕉视频丨天天爽天天狠久久久综合麻豆丨久久人人97超碰国产亚洲人丨亚洲人人爱丨jvid精品视频hd在线丨久久婷婷热丨精品国产美女福到在线不卡丨日本精品网站丨久久精品91视频丨丝袜诱惑一区丨女同亚洲一区二区无线码丨亚洲另类伦春色综合妖色成人网丨黄色大片一区二区三区丨亚洲永久免费丨美女av在线免费观看丨性色a∨人人爽网站hdkp885丨免费在线观看黄色网址丨日产免费一区二区丨五月天中文字幕在线丨天天干网站丨亚洲精品国产成人一区二区丨国产亚洲一区二区三区四区丨免费看黄色三级三级丨成人国内精品视频在线观看丨xxxxwwww国产

Security May Be the ‘Short Board” Restricting Development of IoT, and HED Takes the Lead To Become A Leader in the IoT Security Field

Source: 華大電子
 Release Time: 2020-04-22

According to the Buckets Effect, how much of a bucket filled with water, depends on the shortest piece on the sides of casks. IoT industry with access to 5G shows rapid growth, but the security would become the “short board” restricting its development.

 

For individual customers, the security protects their privacy against infringement when they use connected devices; for enterprise end users, the security holds them harmless against suffering immeasurable losses caused by hacker attacks; and for IoT service providers, the security means more trustworthy products and solutions. Simply put, the security cannot be overemphasized. Yet the reality is that the IoT industry is far from paying enough attention to security.

IoT devices, for instance, have only a simply default password when leaving the factory; for another example, manufacturers only use initial encryption method, and so on. Only in the past 2019, IoT security news emerged in endlessly-millions of IoT cameras were reported to have major vulnerabilities; a 14-year-old hacker was able to control up to 4,000 IoT devices, and there was also a security scandal about Ring, one of Amazon’s fire security products…

Based on this status quo, what security awareness should IoT enterprises establish? How can we safeguard the safety and reliability of IoT devices?

With these questions, the author had in-depth exchanges with Ma Jing, General Manager of Sales Center of CEC Huada Electronic Design Co., Ltd. under CEC. Ms. Ma believed that massive amounts of unsafe connected devices may cause physical accidents, and the security is becoming the key factor restricting the development of IoT. Meanwhile, the software alone can no longer meet the IoT security demand, so the industry urgently needs the hardware to address the security weakness.

Why is it said that “software alone can no longer meet the IoT security demand” ?

In the era of Internet, terminals are generally on the user side, and the connection between the device and the man is very close. With the IoT age coming, tens of billions of devices are widely deployed in every corner of the globe, and attackers can easily launch two types of attacks:

Local attack: Hackers can conduct a reverse analysis of IoT devices or obtain the codes and work mechanisms of devices through hardware and software, so as to launch remote network attacks on servers or IoT devices.



Remote attack: By way of example of man-in-the-middle attacks, hackers can eavesdrop on communication data of the IoT devices and the cloud, so as to analyze and obtain some sensitive data from interactive information.

The author noted that foreign media reported last April that a security research organization disclosed unprecedented security vulnerabilities of IoT cameras, covering more than 2 million surveillance cameras. These cameras use a P2P communication software component of iLnkP2P developed by a domestic manufacturer. This component contains two vulnerabilities. Among these, the iLnKP2P authentication vulnerability allows attackers to intercept the connection of the devices and perform man-in-the-middle attacks and remotely control devices for eavesdropping, passwords stealing and remote invasion.

This shows that the software alone cannot effectively protect the security of IoT devices. Considering these existing pain points, HED launched professional IoT security SE chips, providing higher security protection for the IoT through hardware.

“In having communications between the IoT device and the cloud, random numbers are often introduced to ensure that even the same data is not the same on the communication links,” said Ma Jing, “although the software can achieve this function, the random number algorithms conducted by the software leave data exposed to a greater risk of being cracked as a result of the big data analysis, while the hardware can generate random numbers in the true sense through thermal noise or chaos principle of semiconductors, greatly improving the security level of anti-tapping and anti-tampering. ”

Further, power consumption attacks are also common; to be specific, there is a difference in power consumption when the device calculates 0 or 1, and the hackers may use the difference in physical power consumption to conduct reverse reasoning of data. To settle this problem, the IoT security chips can remove the difference of power consumption information occurring in the calculation of data by devices, and also can interfere with data, effectively preventing hackers from obtaining calculated data.

HED’s SE security chips are far from merely encrypting data

“Encryption does not mean security, and security chips are not just cryptographic algorithms,” Ma Jing concluded, “security threats in IoT applications include both single product security, such as anti-copying boards, local data storage security, and device networking security, such as device identification, identity authentication, data encryption transmission and OTA security upgrade.” Therefore, as an originator of the concept “security chips” of IoT, HED summarizes the requirements of IoT security in the following four aspects: device identification, bi-directional identity authentication between the device and the cloud, encrypted data transmission and remote OTA security upgrade.

To meet above requirements, the IoT security should contain a safe environment, safe data protection and safe processing flow, all of which are indispensable. Based on this, HED’s SE security chips have three functions including sensitive information protection, data transmission encryption and identity authentication.

 

The security needs to be paid great attention to from one end to another end of IoT, and the security awareness needs to be cultivated and accumulated for years. This puts forward higher requirements for security service suppliers. Domestically, HED has been awarded “Prize of Most Influential Enterprise in IoT Security” for three consecutive years, showcasing its excellent strength in the security chip field.

Although the term “Internet of Things” was coined not long ago, all kinds of smart card devices belong to the IoT devices in a broad sense, and have long-term requirements on security. Therefore, HED has carried certain IoT security genes since its inception. By now, HED has become a global supplier of smart card security chips and also one of the largest security chip suppliers.

In addition, to correspond to international algorithms, China has launched cryptographic algorithms with independent intellectual property rights, which is generally known as Chinese cryptographic algorithms. Currently, HED has developed a variety of security chips supporting both international algorithms and Chinese cryptographic algorithms. Its product security has passed the certification of many third-party testing agencies and obtained security qualifications of China Cryptogram Certification Level 2, UnionPay Chip Security, EAL4+/EAL5+, etc.

What’s more, as an important hardware product, HED’s SE security chips have internal software support, including an operating system and a file system, among other systems, so as to meet security needs of different scenarios and businesses. By combination of hardware and software, the SE security chips can provide customers with tailored security services.

Of course, in addition to security, low power consumption is also a factor that IoT devices need to focus on. HED also developed the ultra-low-power consumption security chip, with its standby power consumption less than 1μA and its large operating power consumption not exceeding 10mA. This chip can meet higher requirements on standby power and operating power consumption which the IoT puts forward aiming at security chips.


Which fields should pay more attention to the IoT security?

The IoT, ranging so wide, develops at different rates in different industries and has different degrees of security requirements in subdivided fields. So, the IoT segments involving people’s life, property and privacy security desperately need the IoT security chips.



In the IoV field, smart cars, as a mobile IoT carrier, use a wide variety of technologies internally. This also means that they face greater information security risks. The Guideline for Developing National Internet of Vehicles Industry Standard System released by the Ministry of Industry and Information Technology of the People’s Republic of China and Standardization Administration of the People’s Republic of China at the end of 2017 lists the information security construction as an important part of the intelligent connected vehicles standard system. By now, HED’s SE security chips can not only provide various levels of information security protection for passenger vehicles, but also help the government effectively monitor whether automobile exhaust pollutants of commercial vehicles meet the “China VI Vehicle Emission Standards”, realizing the innovation application of IoV security chips. This is a milestone breakthrough for a Chinese chip supplier.

In the smart security field, China has built the world’s largest video monitoring network with years of efforts. However, the security situations of our smart safeguard systems are hardly optimistic. The Technical Requirements for Information Security of Video Surveillance Network System for Public Security (GB35114-2017), the technical standards established by China in respect of the information security of video surveillance network, were officially implemented in November 2018, becoming the technical basis for comprehensively improving information security in the field of public security video surveillance. So far, HED has developed the security chips conforming to specifications A/B/C of GB35114, providing safeguard for various security needs.

In the smart metering field, the metering industry has evolved from mechanical metering to smart IC card metering, and to the present IoT metering. While solving the functional issues in the smart, digital, and information aspects, IoT technologies are susceptible to serious security threats in terms of the network and information security. To respond to these serious security threats, HED works with partners to provide a complete set of IoT security solutions for the smart metering industry, so as to effectively protect the data security of IoT metering, keep the property and privacy security of users, and safeguard the healthy development of the smart metering industry.

Besides, HED’s SE security chips and its solutions are widely applied in smart home, smart door locks, etc, providing both security safeguard for products and anti-counterfeiting solutions for accessories and consumables.

The IoT security needs joint efforts

Only after a long-term continuous improvement and evolvement and joint efforts of the industry is IoT security safeguarded. HED, as a pioneer in the security chip field, has explored a set of effective solutions for the IoT security, but the maturity of this industry needs the concerted efforts made by all enterprises.

 

 

Fortunately, some enterprises and management agencies have become the “leaders” in the IoT security field, and the whole IoT industry is increasingly paying attention to the security. With this, the security is expected to be greatly improved.

At the industrial level, the 2019 China Cybersecurity Development White Paper released by CCID showed that the IoT security market size in China reached RMB 8.82 billion and hit an annual growth rate of 34.7% in 2018. According to Gartner, the expenditures of the IoT security are estimated to reach USD 3.1 billion by 2021. Therefore, how to settle the IoT security issues is one of main concerns of enterprises.

In terms of policies, since 2017, the Chinese laws and regulations have been promulgated one after another, such as the Cybersecurity Law of the People’s Republic of China, the Cryptography Law of the People’s Republic of China, the Regulations on Protection of Critical Information Infrastructure Security, and the Regulations on Classified Protection of Cybersecurity. This means that importance of security is constantly increasing and has become a key point which cannot be ignored at the policy level.

For sure, the IoT security willcertainly become more and more important in the future, so it’s high time that all the companies consider how to safeguard the product security before security issues exist out there.


Source: Internet of Things Think-tank

Share
  • toolbar
    Back to Top
www四虎com| 婷婷色综合网| 亚洲国产成人久久综合人| 91午夜精品亚洲一区二区三区| 人妻丝袜无码国产一区| 亲子乱一区二区三区| 久久久久一级| 免费看黄色片网站| 呦交小u女精品视频| 亚洲欧洲无卡二区视頻| 麻豆私人影院| 久久久久国产视频| 国产av亚洲精品久久久久李知恩| 欧美熟妇丰满xxxxx裸体艺术| 乱荡少妇xxhd| 国产精品一区二区在线免费观看| 99久久久久久| 爱爱综合| 国产一区二区女内射| 久久久久久久久久91| 波多野结衣www| 白俄罗斯毛片| 青青青青操| 6080yyy午夜理论片中无码| 国内精品2020情侣视频| 欧美特黄视频| 翁虹三级做爰在线播放| 日韩欧美毛片| 色久综合网精品一区二区| 欧美亚洲一区| 欧美黄色大片免费看| 久久综合色鬼综合色| 欧美日韩久久婷婷| aaa国产视频| 欧美sm视频| 婷婷丁香五月天综合东京热| 欧美寡妇性猛交ⅹxxx| 少妇性l交大片免费观看冫| 日韩久久久久久久久久久| 久久婷婷丁香| 黄色网战在线观看| 一本无码av中文出轨人妻| 精品久久久久久人妻无码中文字幕| 97成网| 拍国产乱人伦偷精品视频| 国产特黄级aaaaa片免| 久久人妻精品国产| 日韩av麻豆| 午夜福利啪啪片| 凹凸在线无码免费视频| 日本三级香港三级人妇三| 精品成人一区二区三区| 国产天堂第一区| 国产九九九精品| 隔壁邻居是巨爆乳寡妇| 未满十八18禁止午夜免费网站| 欧美色图17p| 免费人成网| 国产高潮视频在线观看| 国产精品99在线观看| 国产区视频在线观看| 天堂中文资源在线| 成av在线| 欧美草b| 性与爱午夜视频免费看| 欧美日韩一卡2卡三卡4卡 乱码欧美孕交 | 91精品推荐| 久久青青草原精品国产app| 人妻少妇精品视频一区二区三区| 久久av色| 丁香激情五月| 免费看av毛片| 国产精品观看| 国产日韩综合av在线观看一区| 好吊一区二区三区| 免费欧美大片| 性色av蜜臀av牛牛影院| 国产成人丝袜精品视频app| 亚洲精品综合第一国产综合| 国产成人一区二区青青草原| 五月天色丁香| 亚洲国产欧洲综合997久久| √天堂中文官网8在线| 狠狠干b| zzijzzij亚洲日本成熟少妇| 色射影院| 天堂网www在线资源中文| 欧美激情一区二区三区成人| 色站在线| 小荡货好紧好爽奶头大视频| 欧美日韩中文字幕一区| a级片免费播放| 黄床大片免费30分钟国产精品| 亚洲精品国产suv一区88| 麻豆精品视频在线观看| 国产亚洲精品aa片在线观看网站| 欧美午夜精品一区二区| 猎艳山村丰满少妇| 久久婷婷色| 黄色插插视频| 久久蜜臀| 性生交大全免费看| 懂色av一区二区三区四区| 国产色视频免费| 国产精品新婚之夜泄露女同| 日本videos多次高潮| 亚洲国产成人久久精品大牛影视| 美女胸18大禁视频网站| 欧美日韩视频在线第一区 | 变态拳头交视频一区二区| 一级中国毛片| av高清| 麻豆一级片| 成年片色大黄全免费网站久久| 国产欧美在线视频| 国产精品夜夜春夜夜爽久久小| 翁虹三级做爰在线播放| 色88888久久久久久影院| 777色婷婷视频二三区| 张柏芝54张无删码艳照在线播放| 大江大河第三部50集在线观看旭豪| 女性自慰网站免费看ww | 91精品婷婷国产综合久久| 色婷婷成人| 黄色不雅视频| 成人做爰69片免费看网站| 色偷偷亚洲女人的天堂| 免费国产a国产片高清| 亚洲中文久久久精品无码| 十八岁污网站在线观看| 国产精品久久久久久中文字| 最新国产精品精品视频| 亚洲欧美黑人深喉猛交群| 激情偷拍av| 45分钟免费真人视频| 国产高清在线精品一区app| 亚洲影视精品| 亚洲欧洲无码av电影在线观看| 男人的天堂免费一区二区视频| 九九九热精品| 国产一级一级片| 无码精品一区二区三区在线| 色婷婷久久综合中文久久蜜桃av | 亚洲自拍p| 中文字幕高清av在线| 国产欧美xxxx6666| 国产精品久久久久久久久软件| 中文字幕在线精品乱码| 国产国产成人久久精品| 亚洲男人网| 给我免费的视频在线观看| 日韩在线一二三区| 久久精品aⅴ无码中文字字幕| 亚洲色图第1页| 久久99久国产精品黄毛片入口| 手机看片国产| 精品国模一区二区三区| 国产精品美女久久久久久2021| 免费黄色毛片视频| 久久久久9| 麻豆秘密入口a毛片| 在线观看免费播放av片| 108种啪姿势大全动态图| 熟女丝袜潮喷内裤视频网站| 91爱爱中文字幕| 亚洲最新av网站| 天堂av在线资源| 精品视频免费观看| 国产最爽的乱淫视频国语对白| 日韩黄色影视| 国产偷国产偷亚洲清高孕妇| 国产免费资源| 亚洲欧洲免费视频| 青青青青视频| 亚洲一区久久| 久久久精品一区| 蜜桃成人av| 国产精品中文字幕在线| 天堂网在线最新版www| 日韩中文字幕在线一区二区三区| 免费毛片看片| 非洲黑人性xxxx精品| 丁香九月激情| 亚洲aaaaaaa| 国产精品麻豆入口| 成人区人妻精品一熟女| 99久久人妻无码精品系列蜜桃| 免费精品一区二区三区a片| 成人免费在线视频| 产精品视频在线观看免费| 色噜噜一区二区| 黄色不卡| 热99re久久国免费超精品首页 | 拍拍拍无挡免费视频| ww污污污网站在线看com| 国产精品丝袜久久久久久高清| 色噜噜狠狠狠狠色综合久不| 亚洲成人av中文字幕| 欧美在线视频网站| 久久久网址| 9色视频在线观看| 丰满五十路熟女正在播放| 91精品99| 18进禁男女爱免费视频| 久久影院中文字幕| 日韩欧美性视频| 久久久久国产精品人妻aⅴ武则天| 成人无码精品1区2区3区免费看| 福利100合集 在线播放| 亚洲一二三视频| 99久久精品无码一区二区毛片| a级毛片网| 国产av激情无码久久| 亚洲欧美日韩自偷自拍| 中文字幕123| 欧美又粗又深又猛又爽啪啪九色| 欧美wwwwww| 精品久久久久久久久久久aⅴ| 久拍国产在线观看| 亚洲国产精品福利片在线观看 | 婷婷色色狠狠爱| 伊人福利| 国产老熟女网站| 国产中文字幕免费| 亚洲欧美中文字幕高清在线| 欧美一区内射最近更新| xxxxxx睡少妇xxxx| 三级在线网址| 久久久精品国产| 99久久精品无码一区二区毛片| 午夜精品一区二区三区aa毛片| 少妇高潮流白浆9191| 美女毛片| 在线播放免费人成动漫视频| 国产成人精品一区二区三区福利| 国产麻豆一区二区三区在线观看 | 东北女人毛多水多牲交视频| 在线看成人| 欧美国产一区二区三区激情| 少妇xxxx| 香蕉视频一区二区| 成人在线视频一区二区三区| 国产大学生毛片| 青青视频在线免费观看| 少妇一级二级三级| 色中色av| 国产精品乱码一区二区三| 欧美黑人性猛交xxxx| 91美女吸乳羞羞网站| 奇米超碰在线| www.亚色| 免费无码成人av在线播放不卡| jlzzjlzz亚洲女人18| av高清免费| 一级特黄特色的免费大片视频| 亚洲成人一| 国产精品毛片久久久久久久| 欧美乱码卡一卡二卡三新区| www.五月婷婷.com| 人人草视频在线观看| 韩国毛片网站| 制服丝袜av无码专区| 一及黄色毛片| 91一级片| 97夜夜澡人人波多野结衣| 黄色3级视频| 久久99亚洲精品久久69| 欧美在线三级艳情网站| 免费久久人人爽人人爽av| 久久性生活视频| 久久经精品久久精品免费观看| 国产精品自在线拍国产第一页| 丝袜脚交一区二区| 性欧美精品久久久久久久| 久久久噜噜噜| 欧洲一区在线| 婷婷激情综合| 欧美一级爱爱视频| 亚洲91精品| 成人免费无码视频在线网站| 欧美狂躁少妇xxx| 俺也去综合| 免费黄色看片| 国产成人精品久久综合| 大岛优香中文av在线字幕| 日韩二区三区| 国产不卡免费视频| 亚洲区一| 欧美日韩黄色片| 少妇高潮喷水久久久影院| 久久av喷吹av高潮av萌白| 精久久久久久久| 无码av免费精品一区二区三区| 色77久久综合网| 亚洲欧美日韩成人综合一区| 国产av亚洲aⅴ一区二区| av成人在线看| 曰韩少妇内射免费播放| 五月婷婷中文字幕| 狠狠视频| 一本到在线视频| 久久夜色精品国产噜噜麻豆| 污污视频网站免费观看| 国产99久久久欧美黑人刘玥| 91激情网| 乱亲女h秽乱长久久久| 91户外露出一区二区| 少妇人妻偷人精品一区二区| 69影院在线观看| 色天天天| 九色在线观看| 9久精品| 免费观看成人欧美www色| 欧美亚洲二区| 美女av免费| 亚洲最大成人一区久久久| 国产夫绿帽单男3p精品视频| 国产麻豆md传媒视频| 日本又黄又爽又色又刺激的视频| 人人妻人人藻人人爽欧美一区| 在线观看黄av| 丰满熟妇人妻中文字幕| 国产av激情无码久久天堂| 欧美视频网站| 69福利视频| 开心色婷婷色五月激情| 欧美激情久久久| 久久国产精久久精产国| 免费99精品国产人妻自在现线| 国产aⅴ爽av久久久久久| 婷婷五月综合色视频| 综合网在线| 中文字幕在线播| 亚洲欧洲自拍偷拍| 爱色成人网| 在线一区二区视频| 国产丰满麻豆videossexhd| 精品国产拍国产天天人| 久久99久久精品| a一级黄色|