<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Security for the ‘Internet of Things’</title>
	<atom:link href="http://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 23 Apr 2026 12:41:17 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: solid business</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1633850</link>
		<dc:creator><![CDATA[solid business]]></dc:creator>
		<pubDate>Thu, 11 Apr 2019 11:18:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1633850</guid>
		<description><![CDATA[This is my first time go to see at here and i am really pleassant to read 
all at single place.]]></description>
		<content:encoded><![CDATA[<p>This is my first time go to see at here and i am really pleassant to read<br />
all at single place.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: seguridad toledo</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1550955</link>
		<dc:creator><![CDATA[seguridad toledo]]></dc:creator>
		<pubDate>Wed, 14 Jun 2017 06:18:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1550955</guid>
		<description><![CDATA[Admiring the time and energy you put into your blog 
and detailed information you present. It&#039;s awesome to come across a blog 
every once in a while that isn&#039;t the same out of date rehashed material.

Great read! I&#039;ve saved your site and I&#039;m including your RSS feeds to my Google 
account.]]></description>
		<content:encoded><![CDATA[<p>Admiring the time and energy you put into your blog<br />
and detailed information you present. It&#8217;s awesome to come across a blog<br />
every once in a while that isn&#8217;t the same out of date rehashed material.</p>
<p>Great read! I&#8217;ve saved your site and I&#8217;m including your RSS feeds to my Google<br />
account.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1531463</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Dec 2016 11:41:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1531463</guid>
		<description><![CDATA[FDA Releases Guidance for Medical Device Cybersecurity
http://www.securityweek.com/fda-releases-guidance-medical-device-cybersecurity

The U.S. Food and Drug Administration (FDA) has released guidance on the postmarket management of cybersecurity for medical devices, encouraging manufacturers to implement security controls that cover products throughout their entire life cycle.

In 2014, the FDA released guidance for the premarket management of cybersecurity. The recommendations include limiting access to trusted users via various authentication methods, ensuring that only authorized firmware and software can be installed, and implementing features for cyber incident detection, response and recovery.

The new guidance issued by the FDA focuses on managing cybersecurity risks after the devices have been deployed on a hospital’s network, a patient’s home network, or in a patient’s body.

http://www.securityweek.com/fda-publishes-cybersecurity-guidance-medical-device-manufacturers

Content of Premarket Submissions for Management of Cybersecurity in Medical Devices 
http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM356190.pdf

Postmarket Management of Cybersecurity in Medical Devices
http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf]]></description>
		<content:encoded><![CDATA[<p>FDA Releases Guidance for Medical Device Cybersecurity<br />
<a href="http://www.securityweek.com/fda-releases-guidance-medical-device-cybersecurity" rel="nofollow">http://www.securityweek.com/fda-releases-guidance-medical-device-cybersecurity</a></p>
<p>The U.S. Food and Drug Administration (FDA) has released guidance on the postmarket management of cybersecurity for medical devices, encouraging manufacturers to implement security controls that cover products throughout their entire life cycle.</p>
<p>In 2014, the FDA released guidance for the premarket management of cybersecurity. The recommendations include limiting access to trusted users via various authentication methods, ensuring that only authorized firmware and software can be installed, and implementing features for cyber incident detection, response and recovery.</p>
<p>The new guidance issued by the FDA focuses on managing cybersecurity risks after the devices have been deployed on a hospital’s network, a patient’s home network, or in a patient’s body.</p>
<p><a href="http://www.securityweek.com/fda-publishes-cybersecurity-guidance-medical-device-manufacturers" rel="nofollow">http://www.securityweek.com/fda-publishes-cybersecurity-guidance-medical-device-manufacturers</a></p>
<p>Content of Premarket Submissions for Management of Cybersecurity in Medical Devices<br />
<a href="http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM356190.pdf" rel="nofollow">http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM356190.pdf</a></p>
<p>Postmarket Management of Cybersecurity in Medical Devices<br />
<a href="http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf" rel="nofollow">http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1531277</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 29 Dec 2016 15:29:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1531277</guid>
		<description><![CDATA[33C3: Understanding Mobile Messaging and its Security
http://hackaday.com/2016/12/28/33c3-understanding-mobile-messaging-and-its-security/

The best quote from the talk? “Cryptography is rarely, if ever, the solution to a security problem. Cryptography is a translation mechanism, usually converting a communications security problem into a key management problem.” Any channel can be made secure if all parties have enough key material. The implementation details of getting those keys around, making sure that the right people have the right keys, and so on, are the details in which the devil lives. But these details matter, and as mobile messaging is a part of everyday life, it’s important that the workings are transparently presented to the users. This talk does a great job on the demystification front.]]></description>
		<content:encoded><![CDATA[<p>33C3: Understanding Mobile Messaging and its Security<br />
<a href="http://hackaday.com/2016/12/28/33c3-understanding-mobile-messaging-and-its-security/" rel="nofollow">http://hackaday.com/2016/12/28/33c3-understanding-mobile-messaging-and-its-security/</a></p>
<p>The best quote from the talk? “Cryptography is rarely, if ever, the solution to a security problem. Cryptography is a translation mechanism, usually converting a communications security problem into a key management problem.” Any channel can be made secure if all parties have enough key material. The implementation details of getting those keys around, making sure that the right people have the right keys, and so on, are the details in which the devil lives. But these details matter, and as mobile messaging is a part of everyday life, it’s important that the workings are transparently presented to the users. This talk does a great job on the demystification front.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1531276</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 29 Dec 2016 15:27:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1531276</guid>
		<description><![CDATA[mitmproxy

An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed.

https://mitmproxy.org/]]></description>
		<content:encoded><![CDATA[<p>mitmproxy</p>
<p>An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed.</p>
<p><a href="https://mitmproxy.org/" rel="nofollow">https://mitmproxy.org/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1531275</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 29 Dec 2016 15:27:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1531275</guid>
		<description><![CDATA[33C3: Breaking IoT Locks
http://hackaday.com/2016/12/28/33c3-breaking-iot-locks/

Fast-forward to the end of the talk, and you’ll hear someone in the audience ask [Ray] “Are there any Bluetooth locks that you can recommend?” and he gets to answer “nope, not really.” (If this counts as a spoiler for a talk about the security of three IoT locks at a hacker conference

Unlocking a padlock with your cellphone isn’t as crazy as it sounds. The promise of Internet-enabled locks is that they can allow people one-time use or limited access to physical spaces, as easily as sending them an e-mail. Unfortunately, it also opens up additional attack surfaces. Lock making goes from being a skill that involves clever mechanical design and metallurgy, to encryption and secure protocols.


Relive: Lockpicking in the IoT
http://streaming.media.ccc.de/33c3/relive/8019]]></description>
		<content:encoded><![CDATA[<p>33C3: Breaking IoT Locks<br />
<a href="http://hackaday.com/2016/12/28/33c3-breaking-iot-locks/" rel="nofollow">http://hackaday.com/2016/12/28/33c3-breaking-iot-locks/</a></p>
<p>Fast-forward to the end of the talk, and you’ll hear someone in the audience ask [Ray] “Are there any Bluetooth locks that you can recommend?” and he gets to answer “nope, not really.” (If this counts as a spoiler for a talk about the security of three IoT locks at a hacker conference</p>
<p>Unlocking a padlock with your cellphone isn’t as crazy as it sounds. The promise of Internet-enabled locks is that they can allow people one-time use or limited access to physical spaces, as easily as sending them an e-mail. Unfortunately, it also opens up additional attack surfaces. Lock making goes from being a skill that involves clever mechanical design and metallurgy, to encryption and secure protocols.</p>
<p>Relive: Lockpicking in the IoT<br />
<a href="http://streaming.media.ccc.de/33c3/relive/8019" rel="nofollow">http://streaming.media.ccc.de/33c3/relive/8019</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1531161</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 29 Dec 2016 10:26:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1531161</guid>
		<description><![CDATA[Massive Attack from New &quot;Leet Botnet&quot; Reaches 650 Gbps
http://www.securityweek.com/massive-attack-new-leet-botnet-reaches-650-gbps

New Leet Botnet Shows IoT Device Security Regulation May Become Necessary

Just before Christmas, Imperva found its network under a massive DDoS assault that reached 650 Gbps (Gigabit per second), making it one of the largest known DDoS attacks on record.

Powered by what Imperva is calling the Leet Botnet, the attack occurred on the morning of Dec. 21, and was delivered against several anycasted IPs on the Imperva Incapsula network. 

While precise device attribution is not yet possible, it seems likely that, like Mirai, it uses thousands of compromised IoT devices. 

“Due to IP spoofing, it&#039;s hard to accurately identify the devices used in this attack,” Avishay Zawoznik, security research specialist for the Incapsula product line at Imperva, told SecurityWeek. “We did, however, find some reliable clues in the payload&#039;s content. Here, manual analyses of individual payloads pointed to some type of Linux device. For instance, some were ‘stuffed’ with the details of the proc filesystem (/proc) folder, which is specific to Unix-like systems.”

 Hidden behind spoofed IP addresses, it was impossible to locate the geographical location of the attacking devices; but Imperva was able to analyze the content of the packets being used. Although similar in size to the Mirai attack on KrebsOnSecurity in October, it was immediately clear that this was different. (There have been some suggestions that the Mirai attack against DNS service provider Dyn could have exceeded 1 Tbps.)

Leet&#039;s name comes from a &#039;signature&#039; within the packets. &quot;In the TCP Options header of these packets, the values were arranged so they would spell &#039;1337&#039;. To the uninitiated, this is leetspeak for &#039;leet&#039;, or &#039;elite&#039;,&quot; notes Imperva. 

Two separate payloads were used: regular SYN packets (44 to 60 bytes), and abnormally large SYN packets (799 to 936 bytes). The content of the large packets was taken from the compromised devices and scrambled. The result is an inexhaustible supply of obfuscated and randomized payloads that can bypass any signature-based defenses that mitigate attacks by identifying similarities in packet content. 

There is no immediate solution beyond preparation as far as possible. &quot;Organisations should be prepared to mitigate DDoS attacks and be prepared to get back up and running once the attack is over,&quot; suggests F-Secure security advisor Sean Sullivan. &quot;DDoS attacks cannot be prevented; being prepared to reduce downtime in the aftermath lessens the threat of DDoS. Extortionists will move on to weaker targets that are less prepared.&quot; 

In the short term, warns Sullivan, &quot;There&#039;s little hope that networking and IoT equipment will become more secure, although ISPs could empower their security teams to run cleaner networks.&quot;]]></description>
		<content:encoded><![CDATA[<p>Massive Attack from New &#8220;Leet Botnet&#8221; Reaches 650 Gbps<br />
<a href="http://www.securityweek.com/massive-attack-new-leet-botnet-reaches-650-gbps" rel="nofollow">http://www.securityweek.com/massive-attack-new-leet-botnet-reaches-650-gbps</a></p>
<p>New Leet Botnet Shows IoT Device Security Regulation May Become Necessary</p>
<p>Just before Christmas, Imperva found its network under a massive DDoS assault that reached 650 Gbps (Gigabit per second), making it one of the largest known DDoS attacks on record.</p>
<p>Powered by what Imperva is calling the Leet Botnet, the attack occurred on the morning of Dec. 21, and was delivered against several anycasted IPs on the Imperva Incapsula network. </p>
<p>While precise device attribution is not yet possible, it seems likely that, like Mirai, it uses thousands of compromised IoT devices. </p>
<p>“Due to IP spoofing, it&#8217;s hard to accurately identify the devices used in this attack,” Avishay Zawoznik, security research specialist for the Incapsula product line at Imperva, told SecurityWeek. “We did, however, find some reliable clues in the payload&#8217;s content. Here, manual analyses of individual payloads pointed to some type of Linux device. For instance, some were ‘stuffed’ with the details of the proc filesystem (/proc) folder, which is specific to Unix-like systems.”</p>
<p> Hidden behind spoofed IP addresses, it was impossible to locate the geographical location of the attacking devices; but Imperva was able to analyze the content of the packets being used. Although similar in size to the Mirai attack on KrebsOnSecurity in October, it was immediately clear that this was different. (There have been some suggestions that the Mirai attack against DNS service provider Dyn could have exceeded 1 Tbps.)</p>
<p>Leet&#8217;s name comes from a &#8216;signature&#8217; within the packets. &#8220;In the TCP Options header of these packets, the values were arranged so they would spell &#8217;1337&#8242;. To the uninitiated, this is leetspeak for &#8216;leet&#8217;, or &#8216;elite&#8217;,&#8221; notes Imperva. </p>
<p>Two separate payloads were used: regular SYN packets (44 to 60 bytes), and abnormally large SYN packets (799 to 936 bytes). The content of the large packets was taken from the compromised devices and scrambled. The result is an inexhaustible supply of obfuscated and randomized payloads that can bypass any signature-based defenses that mitigate attacks by identifying similarities in packet content. </p>
<p>There is no immediate solution beyond preparation as far as possible. &#8220;Organisations should be prepared to mitigate DDoS attacks and be prepared to get back up and running once the attack is over,&#8221; suggests F-Secure security advisor Sean Sullivan. &#8220;DDoS attacks cannot be prevented; being prepared to reduce downtime in the aftermath lessens the threat of DDoS. Extortionists will move on to weaker targets that are less prepared.&#8221; </p>
<p>In the short term, warns Sullivan, &#8220;There&#8217;s little hope that networking and IoT equipment will become more secure, although ISPs could empower their security teams to run cleaner networks.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1530224</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 22 Dec 2016 07:58:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1530224</guid>
		<description><![CDATA[New Linux/Rakos threat: devices and servers under SSH scan (again)
http://www.welivesecurity.com/2016/12/20/new-linuxrakos-threat-devices-servers-ssh-scan/

Apparently, frustrated users complain more often recently on various forums about their embedded devices being overloaded with computing and network tasks. What these particular posts have in common is the name of the process causing the problem. It is executed from a temporary directory and disguised as a part of the Java framework, namely “.javaxxx”. Additional names like “.swap” or “kworker” are also used. A few weeks ago, we discussed the recent Mirai incidents and Mirai-connected IoT security problems in The Hive Mind: When IoT devices go rogue and all that was written then still holds true.

The Hive Mind: When IoT devices go rogue
http://www.welivesecurity.com/2016/10/26/hive-mind-iot-devices-go-rogue/

The Internet of Things (IoT) has been referred to by so many different names in the past year: The Internet of Terror, the Internet of Trash and a few other catchy monikers to account for the large amount of vulnerabilities present in new devices that are increasingly present in many homes.


Attack vector

The attack is performed via brute force attempts at SSH logins, in a similar way to that in which many Linux worms operate, including Linux/Moose (which spread by attacking Telnet logins) – also referenced here – as analyzed by ESET since last year. The targets include both embedded devices and servers with an open SSH port and where a very weak password has been set. The obvious aim of this trojan is to assemble a list of unsecured devices and to have an opportunity to create a botnet consisting of as many zombies as possible. The scan starts with not too extensive list of IPs and spreads incrementally to more targets. Only machines that represent low-hanging fruit from the security perspective are compromised. Note that victims reported cases when they had had a strong password but they forgot their device that had online service enabled and it was reverted to a default password after a factory reset. Just a couple of hours of online exposure was enough for such a reset machine to end up compromised!]]></description>
		<content:encoded><![CDATA[<p>New Linux/Rakos threat: devices and servers under SSH scan (again)<br />
<a href="http://www.welivesecurity.com/2016/12/20/new-linuxrakos-threat-devices-servers-ssh-scan/" rel="nofollow">http://www.welivesecurity.com/2016/12/20/new-linuxrakos-threat-devices-servers-ssh-scan/</a></p>
<p>Apparently, frustrated users complain more often recently on various forums about their embedded devices being overloaded with computing and network tasks. What these particular posts have in common is the name of the process causing the problem. It is executed from a temporary directory and disguised as a part of the Java framework, namely “.javaxxx”. Additional names like “.swap” or “kworker” are also used. A few weeks ago, we discussed the recent Mirai incidents and Mirai-connected IoT security problems in The Hive Mind: When IoT devices go rogue and all that was written then still holds true.</p>
<p>The Hive Mind: When IoT devices go rogue<br />
<a href="http://www.welivesecurity.com/2016/10/26/hive-mind-iot-devices-go-rogue/" rel="nofollow">http://www.welivesecurity.com/2016/10/26/hive-mind-iot-devices-go-rogue/</a></p>
<p>The Internet of Things (IoT) has been referred to by so many different names in the past year: The Internet of Terror, the Internet of Trash and a few other catchy monikers to account for the large amount of vulnerabilities present in new devices that are increasingly present in many homes.</p>
<p>Attack vector</p>
<p>The attack is performed via brute force attempts at SSH logins, in a similar way to that in which many Linux worms operate, including Linux/Moose (which spread by attacking Telnet logins) – also referenced here – as analyzed by ESET since last year. The targets include both embedded devices and servers with an open SSH port and where a very weak password has been set. The obvious aim of this trojan is to assemble a list of unsecured devices and to have an opportunity to create a botnet consisting of as many zombies as possible. The scan starts with not too extensive list of IPs and spreads incrementally to more targets. Only machines that represent low-hanging fruit from the security perspective are compromised. Note that victims reported cases when they had had a strong password but they forgot their device that had online service enabled and it was reverted to a default password after a factory reset. Just a couple of hours of online exposure was enough for such a reset machine to end up compromised!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1529942</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 12:33:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1529942</guid>
		<description><![CDATA[Lightweight Cryptography for Embedded Systems in the IoT
http://www.securerf.com/lightweight-cryptography-for-embedded-systems-in-the-iot/

Vulnerabilities of Embedded Systems
Embedded systems are vulnerable to assault for a number of reasons, the chief ones being their connectivity, accessibility and low availability of resources to support security and authentication.

It is estimated that by 2020, there will be 28 billion embedded systems connected to the internet. With greater connectivity comes an increased risk of being attacked. Every communication node becomes a potential weakness. Failure of any one embedded system can create cascading events that, in extreme cases, can bring down entire networks – say, a bank’s ATM machines or a power grid.

Cryptography Suited to Low-Resource Embedded Systems
One of the hurdles to effective encryption is the limited resources available in embedded systems. While devices with adequate power supplies and computing resources, like PCs, can run security protocols rapidly, embedded processors, which have far less power and processing capacity, take longer. Because of the systems’ small processing capabilities, some cryptography researchers have proposed hardening them with ECC protocols.

Our benchmarking and recent publications show that ECC has several drawbacks in securing low-resource devices like embedded systems. For example, the 8- or 16-bit processors typically used in embedded systems do not have the resources to run ECC for authentication, identification and data protection in short timeframes.

SecureRF’s cryptographic solutions for embedded systems are based on Group Theoretic Cryptography. They run up to 63 times faster than ECC while using less than 1% of the power ECC requires, and are quantum-resistant.]]></description>
		<content:encoded><![CDATA[<p>Lightweight Cryptography for Embedded Systems in the IoT<br />
<a href="http://www.securerf.com/lightweight-cryptography-for-embedded-systems-in-the-iot/" rel="nofollow">http://www.securerf.com/lightweight-cryptography-for-embedded-systems-in-the-iot/</a></p>
<p>Vulnerabilities of Embedded Systems<br />
Embedded systems are vulnerable to assault for a number of reasons, the chief ones being their connectivity, accessibility and low availability of resources to support security and authentication.</p>
<p>It is estimated that by 2020, there will be 28 billion embedded systems connected to the internet. With greater connectivity comes an increased risk of being attacked. Every communication node becomes a potential weakness. Failure of any one embedded system can create cascading events that, in extreme cases, can bring down entire networks – say, a bank’s ATM machines or a power grid.</p>
<p>Cryptography Suited to Low-Resource Embedded Systems<br />
One of the hurdles to effective encryption is the limited resources available in embedded systems. While devices with adequate power supplies and computing resources, like PCs, can run security protocols rapidly, embedded processors, which have far less power and processing capacity, take longer. Because of the systems’ small processing capabilities, some cryptography researchers have proposed hardening them with ECC protocols.</p>
<p>Our benchmarking and recent publications show that ECC has several drawbacks in securing low-resource devices like embedded systems. For example, the 8- or 16-bit processors typically used in embedded systems do not have the resources to run ECC for authentication, identification and data protection in short timeframes.</p>
<p>SecureRF’s cryptographic solutions for embedded systems are based on Group Theoretic Cryptography. They run up to 63 times faster than ECC while using less than 1% of the power ECC requires, and are quantum-resistant.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/03/31/security-for-the-internet-of-things/comment-page-10/#comment-1529905</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 08:59:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=25401#comment-1529905</guid>
		<description><![CDATA[Hacking the IoT: As Bad As I Feared It&#039;d Be
An engineer takes on his router and the IoT.
https://www.designnews.com/iot/hacking-iot-bad-i-feared-itd-be/187085758747142?cid=nl.x.dn14.edt.aud.dn.20161216.tst004c]]></description>
		<content:encoded><![CDATA[<p>Hacking the IoT: As Bad As I Feared It&#8217;d Be<br />
An engineer takes on his router and the IoT.<br />
<a href="https://www.designnews.com/iot/hacking-iot-bad-i-feared-itd-be/187085758747142?cid=nl.x.dn14.edt.aud.dn.20161216.tst004c" rel="nofollow">https://www.designnews.com/iot/hacking-iot-bad-i-feared-itd-be/187085758747142?cid=nl.x.dn14.edt.aud.dn.20161216.tst004c</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
