久久久香蕉视频丨天天爽天天狠久久久综合麻豆丨久久人人97超碰国产亚洲人丨亚洲人人爱丨jvid精品视频hd在线丨久久婷婷热丨精品国产美女福到在线不卡丨日本精品网站丨久久精品91视频丨丝袜诱惑一区丨女同亚洲一区二区无线码丨亚洲另类伦春色综合妖色成人网丨黄色大片一区二区三区丨亚洲永久免费丨美女av在线免费观看丨性色a∨人人爽网站hdkp885丨免费在线观看黄色网址丨日产免费一区二区丨五月天中文字幕在线丨天天干网站丨亚洲精品国产成人一区二区丨国产亚洲一区二区三区四区丨免费看黄色三级三级丨成人国内精品视频在线观看丨xxxxwwww国产

Security May Be the ‘Short Board” Restricting Development of IoT, and HED Takes the Lead To Become A Leader in the IoT Security Field

Source: 華大電子
 Release Time: 2020-04-22

According to the Buckets Effect, how much of a bucket filled with water, depends on the shortest piece on the sides of casks. IoT industry with access to 5G shows rapid growth, but the security would become the “short board” restricting its development.

 

For individual customers, the security protects their privacy against infringement when they use connected devices; for enterprise end users, the security holds them harmless against suffering immeasurable losses caused by hacker attacks; and for IoT service providers, the security means more trustworthy products and solutions. Simply put, the security cannot be overemphasized. Yet the reality is that the IoT industry is far from paying enough attention to security.

IoT devices, for instance, have only a simply default password when leaving the factory; for another example, manufacturers only use initial encryption method, and so on. Only in the past 2019, IoT security news emerged in endlessly-millions of IoT cameras were reported to have major vulnerabilities; a 14-year-old hacker was able to control up to 4,000 IoT devices, and there was also a security scandal about Ring, one of Amazon’s fire security products…

Based on this status quo, what security awareness should IoT enterprises establish? How can we safeguard the safety and reliability of IoT devices?

With these questions, the author had in-depth exchanges with Ma Jing, General Manager of Sales Center of CEC Huada Electronic Design Co., Ltd. under CEC. Ms. Ma believed that massive amounts of unsafe connected devices may cause physical accidents, and the security is becoming the key factor restricting the development of IoT. Meanwhile, the software alone can no longer meet the IoT security demand, so the industry urgently needs the hardware to address the security weakness.

Why is it said that “software alone can no longer meet the IoT security demand” ?

In the era of Internet, terminals are generally on the user side, and the connection between the device and the man is very close. With the IoT age coming, tens of billions of devices are widely deployed in every corner of the globe, and attackers can easily launch two types of attacks:

Local attack: Hackers can conduct a reverse analysis of IoT devices or obtain the codes and work mechanisms of devices through hardware and software, so as to launch remote network attacks on servers or IoT devices.



Remote attack: By way of example of man-in-the-middle attacks, hackers can eavesdrop on communication data of the IoT devices and the cloud, so as to analyze and obtain some sensitive data from interactive information.

The author noted that foreign media reported last April that a security research organization disclosed unprecedented security vulnerabilities of IoT cameras, covering more than 2 million surveillance cameras. These cameras use a P2P communication software component of iLnkP2P developed by a domestic manufacturer. This component contains two vulnerabilities. Among these, the iLnKP2P authentication vulnerability allows attackers to intercept the connection of the devices and perform man-in-the-middle attacks and remotely control devices for eavesdropping, passwords stealing and remote invasion.

This shows that the software alone cannot effectively protect the security of IoT devices. Considering these existing pain points, HED launched professional IoT security SE chips, providing higher security protection for the IoT through hardware.

“In having communications between the IoT device and the cloud, random numbers are often introduced to ensure that even the same data is not the same on the communication links,” said Ma Jing, “although the software can achieve this function, the random number algorithms conducted by the software leave data exposed to a greater risk of being cracked as a result of the big data analysis, while the hardware can generate random numbers in the true sense through thermal noise or chaos principle of semiconductors, greatly improving the security level of anti-tapping and anti-tampering. ”

Further, power consumption attacks are also common; to be specific, there is a difference in power consumption when the device calculates 0 or 1, and the hackers may use the difference in physical power consumption to conduct reverse reasoning of data. To settle this problem, the IoT security chips can remove the difference of power consumption information occurring in the calculation of data by devices, and also can interfere with data, effectively preventing hackers from obtaining calculated data.

HED’s SE security chips are far from merely encrypting data

“Encryption does not mean security, and security chips are not just cryptographic algorithms,” Ma Jing concluded, “security threats in IoT applications include both single product security, such as anti-copying boards, local data storage security, and device networking security, such as device identification, identity authentication, data encryption transmission and OTA security upgrade.” Therefore, as an originator of the concept “security chips” of IoT, HED summarizes the requirements of IoT security in the following four aspects: device identification, bi-directional identity authentication between the device and the cloud, encrypted data transmission and remote OTA security upgrade.

To meet above requirements, the IoT security should contain a safe environment, safe data protection and safe processing flow, all of which are indispensable. Based on this, HED’s SE security chips have three functions including sensitive information protection, data transmission encryption and identity authentication.

 

The security needs to be paid great attention to from one end to another end of IoT, and the security awareness needs to be cultivated and accumulated for years. This puts forward higher requirements for security service suppliers. Domestically, HED has been awarded “Prize of Most Influential Enterprise in IoT Security” for three consecutive years, showcasing its excellent strength in the security chip field.

Although the term “Internet of Things” was coined not long ago, all kinds of smart card devices belong to the IoT devices in a broad sense, and have long-term requirements on security. Therefore, HED has carried certain IoT security genes since its inception. By now, HED has become a global supplier of smart card security chips and also one of the largest security chip suppliers.

In addition, to correspond to international algorithms, China has launched cryptographic algorithms with independent intellectual property rights, which is generally known as Chinese cryptographic algorithms. Currently, HED has developed a variety of security chips supporting both international algorithms and Chinese cryptographic algorithms. Its product security has passed the certification of many third-party testing agencies and obtained security qualifications of China Cryptogram Certification Level 2, UnionPay Chip Security, EAL4+/EAL5+, etc.

What’s more, as an important hardware product, HED’s SE security chips have internal software support, including an operating system and a file system, among other systems, so as to meet security needs of different scenarios and businesses. By combination of hardware and software, the SE security chips can provide customers with tailored security services.

Of course, in addition to security, low power consumption is also a factor that IoT devices need to focus on. HED also developed the ultra-low-power consumption security chip, with its standby power consumption less than 1μA and its large operating power consumption not exceeding 10mA. This chip can meet higher requirements on standby power and operating power consumption which the IoT puts forward aiming at security chips.


Which fields should pay more attention to the IoT security?

The IoT, ranging so wide, develops at different rates in different industries and has different degrees of security requirements in subdivided fields. So, the IoT segments involving people’s life, property and privacy security desperately need the IoT security chips.



In the IoV field, smart cars, as a mobile IoT carrier, use a wide variety of technologies internally. This also means that they face greater information security risks. The Guideline for Developing National Internet of Vehicles Industry Standard System released by the Ministry of Industry and Information Technology of the People’s Republic of China and Standardization Administration of the People’s Republic of China at the end of 2017 lists the information security construction as an important part of the intelligent connected vehicles standard system. By now, HED’s SE security chips can not only provide various levels of information security protection for passenger vehicles, but also help the government effectively monitor whether automobile exhaust pollutants of commercial vehicles meet the “China VI Vehicle Emission Standards”, realizing the innovation application of IoV security chips. This is a milestone breakthrough for a Chinese chip supplier.

In the smart security field, China has built the world’s largest video monitoring network with years of efforts. However, the security situations of our smart safeguard systems are hardly optimistic. The Technical Requirements for Information Security of Video Surveillance Network System for Public Security (GB35114-2017), the technical standards established by China in respect of the information security of video surveillance network, were officially implemented in November 2018, becoming the technical basis for comprehensively improving information security in the field of public security video surveillance. So far, HED has developed the security chips conforming to specifications A/B/C of GB35114, providing safeguard for various security needs.

In the smart metering field, the metering industry has evolved from mechanical metering to smart IC card metering, and to the present IoT metering. While solving the functional issues in the smart, digital, and information aspects, IoT technologies are susceptible to serious security threats in terms of the network and information security. To respond to these serious security threats, HED works with partners to provide a complete set of IoT security solutions for the smart metering industry, so as to effectively protect the data security of IoT metering, keep the property and privacy security of users, and safeguard the healthy development of the smart metering industry.

Besides, HED’s SE security chips and its solutions are widely applied in smart home, smart door locks, etc, providing both security safeguard for products and anti-counterfeiting solutions for accessories and consumables.

The IoT security needs joint efforts

Only after a long-term continuous improvement and evolvement and joint efforts of the industry is IoT security safeguarded. HED, as a pioneer in the security chip field, has explored a set of effective solutions for the IoT security, but the maturity of this industry needs the concerted efforts made by all enterprises.

 

 

Fortunately, some enterprises and management agencies have become the “leaders” in the IoT security field, and the whole IoT industry is increasingly paying attention to the security. With this, the security is expected to be greatly improved.

At the industrial level, the 2019 China Cybersecurity Development White Paper released by CCID showed that the IoT security market size in China reached RMB 8.82 billion and hit an annual growth rate of 34.7% in 2018. According to Gartner, the expenditures of the IoT security are estimated to reach USD 3.1 billion by 2021. Therefore, how to settle the IoT security issues is one of main concerns of enterprises.

In terms of policies, since 2017, the Chinese laws and regulations have been promulgated one after another, such as the Cybersecurity Law of the People’s Republic of China, the Cryptography Law of the People’s Republic of China, the Regulations on Protection of Critical Information Infrastructure Security, and the Regulations on Classified Protection of Cybersecurity. This means that importance of security is constantly increasing and has become a key point which cannot be ignored at the policy level.

For sure, the IoT security willcertainly become more and more important in the future, so it’s high time that all the companies consider how to safeguard the product security before security issues exist out there.


Source: Internet of Things Think-tank

Share
  • toolbar
    Back to Top
欧美性欧美zzzzzzzzz| 在线播放成人av| 午夜生活片| 国产精品欧美一区二区三区不卡| 精品国产一级片| 黄色激情网站| 日韩在线欧美在线| 女人舌吻男人茎视频| 亚洲午夜18毛片在线看| 女同啪啪免费网站www| 亚洲精品xxxx| 亚洲欧美精品综合一区| 超碰中文字幕在线| 老熟妇性老熟妇性色| 操综合| 日本www黄| 国产av大陆精品一区二区三区| 亚洲成肉网| 乌克兰女人大白屁股ass| 成人午夜视频在线观看| 一级做性色α爱片久久毛片色| 日韩精品人成在线播放| 国产真实自在自线免费精品| 久久av一区二区三区| 亚洲乱码尤物193yw| 免费日韩毛片| 影音先锋中文无码一区| 亚洲国产av无码一区二区三区| 中文字幕网站| 香蕉一级片| 免费污片网站| 国产叼嘿视频| av在线免费观看网站| 四虎亚洲欧美成人网站| 正在播放少妇呻吟对白| 亚洲国产人成在线观看69网站| 久久久中文网| 日韩在线一卡二卡| 国产熟妇搡bbbb搡bb七区| 卧室激情呻吟黄暴h文| 国产又黄又潮娇喘视频在线观看| www天天干com| 狠狠躁夜夜人人爽天96| 亚洲欧美综合另类自拍| 免费看成人毛片无码视频| 欧美激情亚洲激情| 色77久久综合网| 少妇免费看| 免费一级特黄特色毛片久久看| 波多野结av衣东京热无码专区| 2024av天堂手机在线观看| 中文字幕精品av乱喷| 国产成人avxxxxx在线看| 狠狠色噜噜狠狠狠狠97| 综合久久综合久久88色鬼| 丰满又黄又爽少妇毛片| 蜜臀久久精品99国产精品日本| 国产免费视频青女在线观看| 国产婷婷色一区二区三区四区| 老妇高潮潮喷到猛进猛出| 人妻丰满熟妇av无码区免| 午夜欧美精品久久久久久久 | 日韩三级一区| 三级毛片网站| 超碰天堂| 国产精品一区免费看8c0m| 黑人巨大跨种族video| 欧美视频91| 奇米影视7777狠狠狠狠色 | 国产在线看一区| 五月丁香色综合久久4438| 人人爽人人草| 久久免| 久久七| 日韩一级二级三级| 亚洲a片国产av一区无码| 青青草无码国产亚洲| 深夜成人福利| a免费在线观看| 蜜桃tv一区二区三区| 日本乱子伦| 嫩草院一区二区乱码| 夜夜嗨网站| 丁香婷婷六月综合交清| 可以免费看的av| 国产毛片精品国产一区二区三区| www.色亚洲| 亚洲人成中文字幕在线观看| 一呦二呦三呦精品网站| 中文字幕乱码免费专区| 国产免费无码av片在线观看不卡| 少妇饥渴偷公乱第32章| 99热在线观看免费| 外国a级片| 亚洲 国产 韩国 欧美 在线| 女人裸体性做爰视频| 一性一交一口添一摸视频| av成人天堂| jizz国产视频| 欧美精品五区| 成人羞羞网站| 亚洲成人午夜av| 一区二区三区免费观看视频| 午夜精品免费观看| 亚洲欧美综合精品久久成人网| 一级做a爱片久久毛片a高清| 丁香婷婷成人| 日韩av专区| 丰满双乳峰白嫩少妇视频| 学生妹亚洲一区二区| 亚洲成av人片在线观看无| 久久久无码精品亚洲日韩按摩| 免费看国产成年无码av| 尤物av无码色av无码| 久久青青国产| 亚洲卡一| 天天天做夜夜夜做无码| 国产亚洲视频在线观看| 丰满女人又爽又紧又丰满| 人妻少妇精品无码专区app| 亚洲欧美激情精品一区二区| 国产亚洲欧美精品一区| 牛和人交videos欧美| 天堂8在线新版官网| 久久久96| 日本熟妇丰满大白屁毛片| 免费观看毛片网站| 欧美激情国产在线| 亚洲 欧美 变态 另类 制服| 久久久精品区| 涩涩成人| 日韩欧美中文字幕一区二区三区| 成人国产精品一区二区网站| 欧美a免费| 日韩视频在线观看一区二区三区| 国产精品二区在线| 在线成人福利| 真人做作爱视频| 久久久久久综合网天天| 国产精品怡红院永久免费| av永久免费网站| 韩日精品在线| 欧美精品在线免费观看| 色呦呦在线播放| 99ri视频| 久久一本人碰碰人碰| 国产在线精品一区二区在线观看| 国产精品美女久久久网站动漫| 99久热re在线精品99 6热视频| 色婷婷中文| 日韩视频 中文字幕| 日韩一级视频在线观看| 日本人体一区| 久久精品国产丝袜人妻| 深夜天堂| 国产宾馆自拍| 欧美日韩亚洲在线观看| 老熟女重囗味hdxx69| 国产真实交换多p免视频| 中文无码天天av天天爽| 成人精品视频在线观看不卡| 黄色一级大片在线观看| 国产激情综合在线观看| 黄色的毛片| 免费在线国产| 999久久免费精品国产| 免费女人18a级毛片视频| 欧美做爰xxxⅹ性欧美大片| 久久av无码精品人妻系列试探| 欧美日韩一| 人妻少妇69式99偷拍| 色一情一乱一伦麻豆| 午夜影视网| 麻豆传媒一区二区| 日本熟妇丰满大白屁毛片| 日本黄色aaa| 欧美人与zoxxxx视频| 久久精品国产字幕高潮| 二区三区视频| 免费性色视频| 五月婷婷网| 欧美精品网站在线观看| 小嫩妇好紧好爽18禁视频| 国产亚洲精品久久久久久久久久| 中文字幕一区二区三区乱码| 黄色三级情侣片| 91桃色视频| 国产精品激情| 日本一区二区三区视频在线| 日本亚欧热亚洲乱色视频| 国产欧美一区二区精品婷婷| 免费看少妇作爱视频| 久草网在线观看| 尤物国精品午夜福利视频| 和岳每晚弄的高潮嗷嗷叫视频| 日韩av片无码一区二区三区| 日韩在线一卡二卡| 巨大荫蒂视频欧美大片| 西西人体大胆扒开下部337卩| 国产精品无码一本二本三本色| 忘忧草社区中文字幕www| 亚洲精品在线观| www.youjizz在线| 免费在线看a| 91黄色视屏| 在线播放av片| 欧美色视频在线| av第一福利网站| 久久99亚洲含羞草影院| 首页 国产 欧美 日韩 丝袜| 在线看mv的网址入口| a天堂最新版中文在线地址| 97超级碰碰碰| 亚洲综合无码中文字幕第2页| 91久久久精品国产一区二区蜜臀| 少妇浴室愉情韩国理论| 国产欧美久久久| 色婷婷国产精品| 免费观看bbb毛片大全| 国产精品aaa| 亚洲激情久久| √天堂资源在线中文8在线最新版| 日日插夜夜爽| 少妇被又大又粗又爽毛片 | 久草福利资源在线| 中文字幕亚洲情99在线| 国产成人黄色片| 日韩一级影视| 狠狠躁夜夜躁人人爽蜜桃| 男女www视频| 国产寡妇树林野战在线播放| 动漫av在线看男男| 九九99久久精品综合| 国产亚洲精品久久久闺蜜| 成 年 人 黄 色 大 片大 全| 久久久精品日韩免费观看| 国产亚洲精品久久久玫瑰| 色播综合| 成人小片| 亚洲人成网站色ww| aaaaa黄色片| 日韩日韩日韩日韩日韩| 日韩高清国产一区在线| 日韩久久高清| 天海翼一区二区三区免费| 无码一区二区三区免费| 就去干成人网| 亚洲欧洲日产韩国2020| 在线免费色视频| 国产免费专区| 黄色av免费在线观看| 人妻巨大乳挤奶水hd免费看| 一本大道久久a久久精品综合1 | 久久www色情成人免费观看| 人成免费在线视频| 久久黄色免费网站| 捆绑裸体绳奴bdsm亚洲| 成人做爰100部片免费看网站| 精品综合久久久久久8888| 国产精品有码| 亚洲天堂国产| 人人妻人人添人人爽欧美一区| 69亚洲精品| 激情爆乳一区二区三区| 国产免费av在线| 无码日韩精品一区二区三区免费| 麻豆精品传媒一二三区| 国产美女黄色| 中文字幕综合在线| 亚洲精品国产高清在线观看| 国产精品99一区二区三区| 久久国产精品无码网站| 人妖和人妖互交性xxxx视频| 夜夜躁人人爽天天天天大学生| 美日韩在线观看| 亚洲男人的天堂在线播放| 国产精品国产三级在线...| 四虎亚洲精品无码| 在线观看免费av网| 国产一区99| 亚洲人成人一区二区在线观看 | 无码人妻丝袜在线视频| 中文字幕av伊人av无码av| 人人曰人人做人人| 成人不卡| 免费视频好湿好紧好大好爽| 波多野结衣中文字幕一区二区三区| 亚洲乳大丰满中文字幕| 欧美丰满大黑帍在线播放| 国产成人无码午夜视频在线播放| 成人午夜网| 老司机无码精品a| 不卡av在线| av不卡网站| 九九热视频在线观看| 亚洲欧美日韩久久一区二区| 无码人妻一区二区三区麻豆| 成人性生交a做片| 日韩中文字幕免费在线观看| 色淫湿视频| 老司机在线精品视频| a√在线| √天堂资源在线中文最新版| 国产欧洲精品亚洲午夜拍精品| 久久精品国产99久久六动漫| 风韵人妻丰满熟妇老熟女| 色亚洲欧美| 亚洲日韩精品无码专区| 国产在线色| 最新黄网| 国产在线观看黄色| www浪潮avcom| 久久久精品中文字幕乱码18| blacked欧美极品一区| 亚洲综合资源| 水蜜桃精品一二三| 偷拍女人私密按摩高潮视频| 猫咪免费人成网站www| 韩国三级丰满少妇高潮| 久久不见久久见www电影| 国产大学生呻吟对白精彩在线| 超清 忍不住的亲子伦中文字幕 | 91精品国产自产在线观看| 国产强被迫伦姧在线观看无码| 成熟了的熟妇毛茸茸| 久热这里只精品99国产6| 中文字幕第| 草逼网站| 97成人资源站| 久草加勒比| 国产69久久| 777米奇色狠狠俺去啦奇米77| 黄色av一级片| 九色蝌蚪国产| 国模欣谣大尺度啪啪人体| 深夜视频在线免费观看| 亚洲欧美综合区自拍另类| 久久丫精品忘忧草西安产品| 免费黄色三级网站| 一级全黄色片|