×

Securing Pervasive Connectivity

消耗积分:0 | 格式:rar | 大小:0.28 MB | 2017-05-26

分享资料个

  Securing Pervasive Connectivity

  随着物联网的演变,随意连接的前景。这反过来又推动安全性脱颖而出,因为它已经变得越来越重要,它现在触及的数据和控制路径的每一步,使其成为所有应用程序的积分。没有比这更明显的设备,将坐在‘边缘’的网络,节点将形成‘物’在物联网。

  如果离开无担保,每一个这些‘东西’代表容易访问到另一个私人网络,提高在每一个垂直部门的关注与生产利用物联网的希望。因此,集成设备制造商(IDM)正在越来越大的长度,加上先进的安全功能,他们所有的最新产品。

  就像目前存在的威胁的多样性,安全功能来在许多形状和大小,并在那些旨在提供原始处理性能的设备和那些将引入智能从边缘到网络之间的变化。这些MCU的目的是使边缘设备,如智能传感器和远程访问的驱动器,将需要更先进的安全功能,在较小的,低功耗;面临的一个挑战,每个IDM想要开发物联网的潜力。

 Securing Pervasive Connectivity

  A level of trust

  The specific requirements of a node on the IoT will be dependent on how it is deployed; a device connected to a wired supply, such as a thermostat, may be less concerned with ultra-low power consumption than, say, a remote sensor. An actuator on a piece of manufacturing equipment would have access to all the power it needs, while a wearable device may need to harvest the energy it uses from its surroundings. What they do have in common, however, is a need to carry out their prime objective securely.

  Fortunately, the need for security in a microcontroller has not just been ‘forced’ upon the industry; there have always been applications that value security, it’s just that the volume of devices expected to contribute to the IoT in the next decade or so will drive demand for these devices much higher than it has been in the past.

声明:本文内容及配图由入驻作者撰写或者入驻合作网站授权转载。文章观点仅代表作者本人,不代表电子发烧友网立场。文章及其配图仅供工程师学习之用,如有内容侵权或者其他违规问题,请联系本站处理。 举报投诉

评论(0)
发评论

下载排行榜

全部0条评论

快来发表一下你的评论吧 !