How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

On December 3, 2017, the 4th World Internet Conference was held in Wuzhen. The Arm security architecture was selected as the “2017 World Internet Leading Scientific and Technological Achievement” and was released on the first day of the World Internet Conference. Among them, the latest development of Arm security architecture, Platform Security Architecture, has become the highlight of this release. “The World’s Leading Scientific and Technological Achievements of the Internet of Things” brings together the annual advanced scientific and technological achievements in the Internet field around the world. The selection of Arm’s security architecture represents the unanimous affirmation of the global Internet ecosystem.

How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

As Arm Global Executive Vice President and Greater ChinaDistrict President Allen Wu said in today’s speech: “There are hundreds of billions of devices based on Arm technology in the world, and everyone buys at least 2-3 devices based on Arm technology every year, and we will see trillions of devices in the future. The real value of interconnecting and connecting trillions of devices lies in the free and secure communication of trusted data between different devices.

How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

The continuous release of the “Internet of Things Security Manifesto” and the platform security architecture PSA reflects Arm’s corporate responsibility spirit as an industry leader to take the initiative to take on the security of the Internet of Things. In the future scenario where trillions of devices are interconnected, security threat factors will be more diverse, especially to ensure the security of low-power, low-cost, but large-scale and diverse IoT devices. Insecurity of Things, will it be the new definition of ‘IoT’ in the new era? How will Arm deal with the security concerns of the Internet of Everything?

Insecurity of Things, should not be the trouble of “IoT” in the new era

How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

According to market research firm Gartner, the number of IoT devices (including mobile phones, sensors and various smart devices) worldwide will reach 8.4 billion in 2017, surpassing the total global population for the first time; while Arm itself predicts that by 2035, there will be 10,000 worldwide Connecting billions of devices! The rapid development of the Internet of Things has become the fastest-growing emerging economic system in the history of human civilization. The global cumulative new output value generated by Internet of Things devices has reached 30 trillion US dollars. Equipment and output value will reach more than 60 trillion yuan!

The indifference to security in the huge market has given hackers an opportunity. It was at this time last year that a number of websites on the east coast of the United States, including Twitter, PayPal, The New York Times and The Wall Street Journal, suffered service interruptions and collectively. paralysis. The cause of the accident was not something wrong with the sites themselves, but a massive distributed denial of service (DDoS) attack. The fake requests came not from ordinary botnets of desktops and laptops, but from tens of millions of small internet-connected devices, including internet-connected cameras, home routers and other IoT devices. We used to compare security to the door, locking the door to secure the data center, but when everything is connected, every connected device becomes the entrance to the network.

How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

This attack also sounded the alarm for us. Attackers have been able to use tens of millions of IoT terminal devices with insufficient security to launch malicious attacks. This will be a new round of “arms race” between hackers and computing security experts. , and force every technology enterprise and individual of us in the digital society to participate.

In today’s release session, Allen particularly emphasized: “The era of trillions of new connections requires us to rethink ‘security’ from the inside out, ensure the security of each connected device, and build the security foundation on the underlying architecture of each chip. In terms of hardware and software, establish common security criteria and standards.” Arm proposes to transform security economics in the concept of security, and provide a common security architecture standard from device to cloud at a controllable cost.

The security of Arm’s key IP continues to be upgraded, and the industry’s first general security framework PSA was born

Arm’s technology research and development history in security can be traced back to 2000, when Arm developed SecurCore for smart card payments and SIM cards. On this basis, Arm released TrustZone technology based on hardware protection in 2005. Since then, TrustZone has also become an important component of Arm’s secure computing ecosystem. TrustZone has provided security for 600 million Android devices so far, ensuring fingerprint payments are carried out in a secure environment, and more than 70% of smartphones in the Chinese market support TrustZone’s encrypted fingerprint technology. In 2015, Arm extended its TrustZone technology to the Armv8-M architecture, enabling it to secure small, low-power, low-cost IoT devices.

How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

Since 2015, with the rapid development of the Internet of Things and artificial intelligence, the number of connected devices deployed has grown exponentially, ranging from driverless cars to sensors. At present, the shipment of chips based on Arm IP has exceeded 100 billion, half of which have been completed in the past 4 years, and it is expected that the cumulative shipment will reach 200 billion by 2021, and the next round of trillion-level IoT market about to explode.

These devices are not only huge in number, but also have various applications. Fragmentation needs will exist for a long time. In the future, there will be hundreds of chip manufacturers in the IoT environment, and thousands of OEM manufacturers will manufacture their own IoT products. There are millions of R&D personnel who write software running programs based on the system; at the same time, the huge computing capacity and storage pressure of trillions of devices will bring huge challenges to the cloud, aiming at the innovation and development of scene applications, AI computing power Injecting into the edge, the combination of terminal computing and cloud computing that empowers edge intelligence is the general trend. Based on this, Arm believes that a general method is needed to solve these problems, and the platform security architecture PSA (Platform Security Architecture) is introduced for hardware IP, which is used to realize the security of large-scale and diverse interconnected devices. Active response and support from system, security and cloud service providers.

How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

The platform security architecture is a whole that consists of threat models, security analysis, and hardware and firmware architecture specifications. PSA provides a framework based on industry best practices through which a consistent security design can be achieved at the hardware and firmware level. According to Allen: “PSA mainly consists of three parts: the first is Analysis, to fully understand the risk and threat factors; the second, the creation of software and hardware architecture specifications (Architect); Help relevant personnel to make it possible in the implementation environment.” At the same time, Arm also proposed four guidelines for the security standards of the Internet of Things: first, the identity of the device must be unique; second, trusted Known boot procedure; third, remote upgrades if any potential problems occur; fourth, certificate-based authentication, which means making sure the device you’re communicating with is authentic and not a fake one .

How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

However, no matter what kind of technology, it is difficult for users to start everything. The first consideration for chip manufacturers and OEM manufacturers is for PSA, where to start research and development. Arm will be the first to provide an open source reference implementation firmware that complies with the PSA specification for the Armv8-M system, which is a free reference implementation of PSA at the software level. Independent of operating system, PSA has access to all Arm RTOS and its software vendor partners, including the latest version of the market-proven Mbed OS.

Arm has once again taken a critical step in the “Long March” of interconnected security. For the entire industrial value chain from terminal to cloud, security should not be an after-the-fact remedy, and implanting security into each device is a challenge faced by the entire industry. The task requires the joint completion of all links in the industry chain, which also means the important task shouldered by Arm and the Arm ecosystem—how to jointly ensure that diverse interconnected devices can be based on a common security foundation.

How to escort trillions of connected devices? Arm has a reference answer to “the most secure Internet of Things”

So far, Arm is the only open platform in the world that can provide hundreds of billions of device innovations. Facing the security challenges in the era of IoT and artificial intelligence, the PSA platform security architecture is the “reference answer” given by Arm. On the premise of , it provides a common framework standard, maintains the consistency of device security, and paves the way for low-power, low-cost, large-scale, and secure deployment of the Internet of Things.

In a rapidly changing world, we need to define tomorrow, faster than product makers and hackers, so our solutions must be predictable, flexible and resilient, and the system needs to deal with threats it has never seen before .

In the era of the Internet of Things, let us work together to protect the security of trillions of devices and enjoy the beautiful life brought by technology.

The Links:   EL640200-SK PM30CSJ060

Bookmark the permalink.

Comments are closed.