Abstract:
For many devices deployed “at the edge” of connected systems- ranging from smart thermostats and emerging consumer products to process monitoring and mechatronics, authentication is critical. How can a remote system determine with a high-level of confidence, that the end-device is what it purports to be, and not a comprised or spoofed node offering an attacker easy entry into the system? Conversely, how can an end-device authenticate over-the-air firmware or other updates? Security is often described as a chain of trust. If not considered, these scenarios might be the “weakest link” in that chain. In this presentation, Cary will briefly outline some of the current hardware-level authentication strategies, implementation techniques and their tradeoffs.