New resource for embedded designers working with IoT devices

Icon Labs has announced a new resource for embedded designers working with IoT applications: a white paper focusing on “Device Security for the IIoT”.

Developed with Renesas Electronics America, a premier supplier of advanced semiconductor solutions, as a deep-dive guide for design engineers developing networked and web-connected equipment and solutions, the white paper outlines security requirements for Industrial Internet of Things (IIoT) devices and software solutions that are available today for securing these devices.


The IIoT is driving investment in new technology and manufacturing methodologies as companies rush to capitalize on a predicted trillions of dollars of economic gain. Unfortunately, traditional security solutions do not scale down to support the RTOS-based devices that make up the bulk of the IIoT. New solutions and approaches are required for these systems that perform critical functions in factories, the electric grid, transportation infrastructure, and other industrial segments.

“It is critical for system engineers to address security issues at every layer, from the sensors and actuators, to the controllers and the connected operations and business systems,” said Julian Psaila, Director, Marketing, General Purpose Unit, at Renesas Electronics America. “Although traditional IT-endpoint security and network-monitoring solutions protect IT business applications, such solutions won’t work for the embedded devices closest to the physical systems, which must be protected against cyberattacks by integrating security directly into the devices themselves.”

“Minimizing vulnerabilities requires specialized security software,” said Alan Grau, CEO of Icon Labs. “To support enterprise security standards, embedded devices must incorporate the following key features: secure boot code, secure application updates, tightly controlled authentications, and secure communication protocols.”

The white paper covers new IIoT security platforms, as well as access control, security protocols, asymmetric and symmetric encryption, hardware security modules, intrusion detection, secure boot, secure firmware update, Data At Rest (DAR) Protection, and security management and visibility.


Available downloads:


Comments are closed, but trackbacks and pingbacks are open.