国产无遮挡a片又黄又爽漫画丨成人aⅴ视频丨一级做a爱片性色毛片丨亚洲天堂午夜丨日韩一区二区三免费高清丨岛国在线视频丨亚洲国产精品嫩草影院丨无码手机线免费观看丨亚洲综合成人网丨亚洲 欧美 动漫 少妇 自拍丨男人亚洲天堂丨jizz成熟丰满老女人丨勾搭足浴女技师国产在线丨成人免费mmmmm视频丨亚洲精品无码av人在线观看丨av黄色影院丨天堂网www天堂在线资源丨91色在线丨天天干天天爱天天射丨久久精品成人免费国产片桃视频

Security May Be the ‘Short Board” Restricting Development of IoT, and HED Takes the Lead To Become A Leader in the IoT Security Field

Source: 華大電子
 Release Time: 2020-04-22

According to the Buckets Effect, how much of a bucket filled with water, depends on the shortest piece on the sides of casks. IoT industry with access to 5G shows rapid growth, but the security would become the “short board” restricting its development.

 

For individual customers, the security protects their privacy against infringement when they use connected devices; for enterprise end users, the security holds them harmless against suffering immeasurable losses caused by hacker attacks; and for IoT service providers, the security means more trustworthy products and solutions. Simply put, the security cannot be overemphasized. Yet the reality is that the IoT industry is far from paying enough attention to security.

IoT devices, for instance, have only a simply default password when leaving the factory; for another example, manufacturers only use initial encryption method, and so on. Only in the past 2019, IoT security news emerged in endlessly-millions of IoT cameras were reported to have major vulnerabilities; a 14-year-old hacker was able to control up to 4,000 IoT devices, and there was also a security scandal about Ring, one of Amazon’s fire security products…

Based on this status quo, what security awareness should IoT enterprises establish? How can we safeguard the safety and reliability of IoT devices?

With these questions, the author had in-depth exchanges with Ma Jing, General Manager of Sales Center of CEC Huada Electronic Design Co., Ltd. under CEC. Ms. Ma believed that massive amounts of unsafe connected devices may cause physical accidents, and the security is becoming the key factor restricting the development of IoT. Meanwhile, the software alone can no longer meet the IoT security demand, so the industry urgently needs the hardware to address the security weakness.

Why is it said that “software alone can no longer meet the IoT security demand” ?

In the era of Internet, terminals are generally on the user side, and the connection between the device and the man is very close. With the IoT age coming, tens of billions of devices are widely deployed in every corner of the globe, and attackers can easily launch two types of attacks:

Local attack: Hackers can conduct a reverse analysis of IoT devices or obtain the codes and work mechanisms of devices through hardware and software, so as to launch remote network attacks on servers or IoT devices.



Remote attack: By way of example of man-in-the-middle attacks, hackers can eavesdrop on communication data of the IoT devices and the cloud, so as to analyze and obtain some sensitive data from interactive information.

The author noted that foreign media reported last April that a security research organization disclosed unprecedented security vulnerabilities of IoT cameras, covering more than 2 million surveillance cameras. These cameras use a P2P communication software component of iLnkP2P developed by a domestic manufacturer. This component contains two vulnerabilities. Among these, the iLnKP2P authentication vulnerability allows attackers to intercept the connection of the devices and perform man-in-the-middle attacks and remotely control devices for eavesdropping, passwords stealing and remote invasion.

This shows that the software alone cannot effectively protect the security of IoT devices. Considering these existing pain points, HED launched professional IoT security SE chips, providing higher security protection for the IoT through hardware.

“In having communications between the IoT device and the cloud, random numbers are often introduced to ensure that even the same data is not the same on the communication links,” said Ma Jing, “although the software can achieve this function, the random number algorithms conducted by the software leave data exposed to a greater risk of being cracked as a result of the big data analysis, while the hardware can generate random numbers in the true sense through thermal noise or chaos principle of semiconductors, greatly improving the security level of anti-tapping and anti-tampering. ”

Further, power consumption attacks are also common; to be specific, there is a difference in power consumption when the device calculates 0 or 1, and the hackers may use the difference in physical power consumption to conduct reverse reasoning of data. To settle this problem, the IoT security chips can remove the difference of power consumption information occurring in the calculation of data by devices, and also can interfere with data, effectively preventing hackers from obtaining calculated data.

HED’s SE security chips are far from merely encrypting data

“Encryption does not mean security, and security chips are not just cryptographic algorithms,” Ma Jing concluded, “security threats in IoT applications include both single product security, such as anti-copying boards, local data storage security, and device networking security, such as device identification, identity authentication, data encryption transmission and OTA security upgrade.” Therefore, as an originator of the concept “security chips” of IoT, HED summarizes the requirements of IoT security in the following four aspects: device identification, bi-directional identity authentication between the device and the cloud, encrypted data transmission and remote OTA security upgrade.

To meet above requirements, the IoT security should contain a safe environment, safe data protection and safe processing flow, all of which are indispensable. Based on this, HED’s SE security chips have three functions including sensitive information protection, data transmission encryption and identity authentication.

 

The security needs to be paid great attention to from one end to another end of IoT, and the security awareness needs to be cultivated and accumulated for years. This puts forward higher requirements for security service suppliers. Domestically, HED has been awarded “Prize of Most Influential Enterprise in IoT Security” for three consecutive years, showcasing its excellent strength in the security chip field.

Although the term “Internet of Things” was coined not long ago, all kinds of smart card devices belong to the IoT devices in a broad sense, and have long-term requirements on security. Therefore, HED has carried certain IoT security genes since its inception. By now, HED has become a global supplier of smart card security chips and also one of the largest security chip suppliers.

In addition, to correspond to international algorithms, China has launched cryptographic algorithms with independent intellectual property rights, which is generally known as Chinese cryptographic algorithms. Currently, HED has developed a variety of security chips supporting both international algorithms and Chinese cryptographic algorithms. Its product security has passed the certification of many third-party testing agencies and obtained security qualifications of China Cryptogram Certification Level 2, UnionPay Chip Security, EAL4+/EAL5+, etc.

What’s more, as an important hardware product, HED’s SE security chips have internal software support, including an operating system and a file system, among other systems, so as to meet security needs of different scenarios and businesses. By combination of hardware and software, the SE security chips can provide customers with tailored security services.

Of course, in addition to security, low power consumption is also a factor that IoT devices need to focus on. HED also developed the ultra-low-power consumption security chip, with its standby power consumption less than 1μA and its large operating power consumption not exceeding 10mA. This chip can meet higher requirements on standby power and operating power consumption which the IoT puts forward aiming at security chips.


Which fields should pay more attention to the IoT security?

The IoT, ranging so wide, develops at different rates in different industries and has different degrees of security requirements in subdivided fields. So, the IoT segments involving people’s life, property and privacy security desperately need the IoT security chips.



In the IoV field, smart cars, as a mobile IoT carrier, use a wide variety of technologies internally. This also means that they face greater information security risks. The Guideline for Developing National Internet of Vehicles Industry Standard System released by the Ministry of Industry and Information Technology of the People’s Republic of China and Standardization Administration of the People’s Republic of China at the end of 2017 lists the information security construction as an important part of the intelligent connected vehicles standard system. By now, HED’s SE security chips can not only provide various levels of information security protection for passenger vehicles, but also help the government effectively monitor whether automobile exhaust pollutants of commercial vehicles meet the “China VI Vehicle Emission Standards”, realizing the innovation application of IoV security chips. This is a milestone breakthrough for a Chinese chip supplier.

In the smart security field, China has built the world’s largest video monitoring network with years of efforts. However, the security situations of our smart safeguard systems are hardly optimistic. The Technical Requirements for Information Security of Video Surveillance Network System for Public Security (GB35114-2017), the technical standards established by China in respect of the information security of video surveillance network, were officially implemented in November 2018, becoming the technical basis for comprehensively improving information security in the field of public security video surveillance. So far, HED has developed the security chips conforming to specifications A/B/C of GB35114, providing safeguard for various security needs.

In the smart metering field, the metering industry has evolved from mechanical metering to smart IC card metering, and to the present IoT metering. While solving the functional issues in the smart, digital, and information aspects, IoT technologies are susceptible to serious security threats in terms of the network and information security. To respond to these serious security threats, HED works with partners to provide a complete set of IoT security solutions for the smart metering industry, so as to effectively protect the data security of IoT metering, keep the property and privacy security of users, and safeguard the healthy development of the smart metering industry.

Besides, HED’s SE security chips and its solutions are widely applied in smart home, smart door locks, etc, providing both security safeguard for products and anti-counterfeiting solutions for accessories and consumables.

The IoT security needs joint efforts

Only after a long-term continuous improvement and evolvement and joint efforts of the industry is IoT security safeguarded. HED, as a pioneer in the security chip field, has explored a set of effective solutions for the IoT security, but the maturity of this industry needs the concerted efforts made by all enterprises.

 

 

Fortunately, some enterprises and management agencies have become the “leaders” in the IoT security field, and the whole IoT industry is increasingly paying attention to the security. With this, the security is expected to be greatly improved.

At the industrial level, the 2019 China Cybersecurity Development White Paper released by CCID showed that the IoT security market size in China reached RMB 8.82 billion and hit an annual growth rate of 34.7% in 2018. According to Gartner, the expenditures of the IoT security are estimated to reach USD 3.1 billion by 2021. Therefore, how to settle the IoT security issues is one of main concerns of enterprises.

In terms of policies, since 2017, the Chinese laws and regulations have been promulgated one after another, such as the Cybersecurity Law of the People’s Republic of China, the Cryptography Law of the People’s Republic of China, the Regulations on Protection of Critical Information Infrastructure Security, and the Regulations on Classified Protection of Cybersecurity. This means that importance of security is constantly increasing and has become a key point which cannot be ignored at the policy level.

For sure, the IoT security willcertainly become more and more important in the future, so it’s high time that all the companies consider how to safeguard the product security before security issues exist out there.


Source: Internet of Things Think-tank

Share
  • toolbar
    Back to Top
亚洲一区视频在线播放 | av片免费观看 | 91精品人妻一区二区三区四区 | 这里只有精彩视频 | 日本成人在线播放 | 欧美一级欧美三级在线观看 | av大片在线观看 | 韩国中文字幕 | 免费啪视频 | 日本少妇一级片 | 最新色站| 香蕉视频免费在线观看 | 亚洲图片欧美另类 | 日韩黄色免费电影 | 欧美丰满熟妇bbbbbb | 天天干在线观看 | 日本一区二区三区免费视频 | 午夜剧场免费观看 | 奇米影视第四色777 俄罗斯videodesxo极品 | 激情丁香 | 日韩视频免费观看高清完整版在线观看 | 中文字幕在线观看视频免费 | 91麻豆成人精品国产 | 日韩资源 | 骚虎视频在线观看 | 国产伊人久久 | 国产欧美综合一区二区三区 | 麻豆传媒网站 | 亚洲精品永久免费 | 娇小6一8小毛片 | 天天色一色 | 91精品久久香蕉国产线看观看 | 97超碰免费在线观看 | 亚洲视频在线观看网站 | 精品久久久av | 亚洲第一成人av | 丁香花婷婷 | 无码人妻丰满熟妇奶水区码 | 亚洲av无码一区二区二三区 | 日本男人的天堂 | 丁香六月欧美 | 99插插插 | 来吧亚洲综合网 | 无码成人精品区在线观看 | 久久a级片 | 五月开心婷婷 | 黄色在线视频观看 | 国产欧美一区二区三区四区 | 丰满双乳秘书被老板狂揉捏 | 欧美精品久久久久久久多人混战 | 青青草青青操 | 俺去啦最新网址 | 国产精品福利网站 | 99久久99久久精品国产片果冰 | 日本国产高清 | 日韩精品――中文字幕 | 99久久久国产精品免费蜜臀 | 天天曰天天 | 欧美老女人性视频 | 深夜福利网站在线观看 | 日韩视频第一页 | 国产调教打屁股xxxx网站 | 国产精品av一区二区 | 久久福利一区 | 成人久久久久久 | 成人日韩 | 人妻少妇偷人精品无码 | 国产免费福利视频 | 韩国一二三区 | 国产综合在线视频 | 精品夜夜澡人妻无码av | 九九看片 | 午夜整容室 | 成人性爱视频在线观看 | 污片视频在线观看 | 人妻无码中文久久久久专区 | 视色网站 | 91字幕网| 69xxxx日本 | 青青草这里只有精品 | 精品久久久久一区二区国产 | 欧美日韩国产不卡 | 在线99 | 亚洲图片欧美在线 | 永久免费成人代码 | 91偷拍视频 | 玉女心经是什么意思 | 香蕉久久久久久 | 黑人精品欧美一区二区蜜桃 | 欧美极品xxxx| 六月丁香色婷婷 | 日韩怡春院 | 亚洲精品国产精品乱码不卡 | 亚洲激情在线视频 | 日韩精品成人 | 亚洲免费在线观看视频 | 国内自拍偷拍 | 香蕉网在线观看 | 欧美1234区 | 99热这里只有精品99 | 久久免费视频1 | 成人91av | 久久久久亚洲无码 | 日韩成人精品一区二区 | 国产精品成人一区二区三区电影毛片 | 国语对白 | 欧美三级精品 | 欧美被狂躁喷白浆精品 | 五色天婷婷 | www.色综合| 日韩视频在线观看免费 | 打屁股无遮挡网站 | 男插女视频在线观看 | 老熟妇毛片 | 日日操夜夜撸 | 黄色小说网站在线观看 | 一区二区亚洲视频 | 第一福利丝瓜av导航 | 区一区二区三 | 国产激情啪啪 | 亚洲美女视频网站 | 台湾佬综合网 | 国产精品一区二区三区在线免费观看 | 成人五区 | 国产精品久久久久久久久免费看 | 高清18麻豆 | 中文字幕亚洲欧美日韩 | 猛1被调教成公厕尿便失禁网站 | 欧美香蕉 | 色资源在线观看 | 国产一区二区精品在线观看 | 高清国产一区 | 在线观看日韩欧美 | 久久久久久久久久久久久久久久久久久久 | 一级黄色片免费观看 | 免费看污片网站 | 国模精品视频一区二区 | 欧美黄色大片网站 | 国产一级二级视频 | 黄页在线免费观看 | 国产在线专区 | 人妖无码 | 特黄三级又爽又粗又大 | 欧美草比| 欧美在线a| av映画 | 久久伊人热 | 国产破处av | 日本91av| 国产女18毛片多18精品 | 久久精品久久久 | 成人h动漫精品一区二区器材 | 国产一级免费 | 欧美视频日韩视频 | www.蜜臀av | 亚洲女人天堂 | 午夜小视频在线观看 | 91网站在线播放 | 男人天堂网在线 | 久久精品在这里 | 国产精品视频 | 午夜性视频 | 免费人成在线 | 欧美aⅴ | 亚洲色图校园春色 | 日本午夜精品理论片a级app发布 | 奇米影视在线观看 | 成人免费精品 | 曰本丰满熟妇xxxx性 | 亚洲男人的天堂网站 | 国产哺乳奶水91在线播放 | 天天干天天操 | 午夜婷婷网 | 136福利视频导航 | 第四色av | 亚洲欧洲自拍偷拍 | www.国产黄色 | 亚洲欧美日韩综合在线 | 抱着老师的嫩臀猛然挺进视频 | 国产区视频在线观看 | 中文字幕欧美视频 | 亚洲精品一区二区三区区别 | 91欧美大片 | 国产传媒在线观看 | 黄色免费av | 91蜜桃网| 成年人精品 | 日韩av高清 | 久久福利影院 | 日本青青草视频 | a免费看| 亚洲麻豆av | 五月天爱爱 | 老司机深夜福利视频 | 男人天堂av在线播放 | 永久中文字幕 | 国产黄网在线观看 | 一本一道久久a久久精品逆3p | 熟女丰满老熟女熟妇 | 成年人视频在线 | 欧美日本一区二区三区 | 成人福利av | 性视频网 | 91av视频在线观看 | 青青青免费在线视频 | 国产午夜麻豆影院在线观看 | 国产精九九网站漫画 | 欧美精品一区在线观看 | 亚洲色图欧美日韩 | 深夜福利免费观看 | 一区二区三区av在线 | www.久色 | 欧美mv日韩mv国产 | 国产美女主播 | 日本精品三级 | 超碰在线观看免费 | 久久九九免费视频 | 亚洲国产精彩视频 | 欧美精品99久久久 | 香蕉小视频 | 在线观看视频国产 | 女仆m开腿sm调教室 欧美混交群体交 | 91网站观看 | 精品乱子伦 | 你懂的亚洲 | 久久视频精品 | 国产做受入口竹菊 | 日韩不卡在线观看 | 入禽太深免费视频 | 噜噜噜在线视频 | 亚洲在线一区二区三区 | 日日操夜夜摸 | 免费人妻精品一区二区三区 | 亚洲成人黄色网址 | 欧美极品视频 | 免费午夜影院 | 少妇精品一区 | 激情欧美一区二区三区中文字幕 | 涩涩小黄文 | 国产亚洲精品码 | 欧美激情视频一区二区三区 | 手机在线观看免费av | 欧美在线一区二区 | 久久99网站| 婷婷调教口舌奴ⅴk | 伊人影院在线视频 | 中文毛片无遮挡高潮免费 | 无码视频在线观看 | 被闺蜜摁住强啪futa百合漫画 | 男人天堂2020 | 久久综合久久综合久久综合 | 免费无码又爽又黄又刺激网站 | 五号特工组之偷天换月 | 欧美黄色一区 | 偷拍色图 | 久久不射网| 日韩中文字幕有码 | 黄色片免费观看 | 天天摸夜夜 | 视频一区亚洲 | 在线免费看毛片 | 亚洲综合av网 | 亚洲精品视频观看 | 999久久久国产精品 国产精品免费一区 | 一个人看的www网站 亚洲天堂美女 | 国产精品亚洲无码 | 日本成人免费视频 | 国产精品久久久久久精 | 外国毛片| 久久久久久久久影院 | 二级黄色片 | 天天干,夜夜操 | 高清一区二区 | 我的丝袜美腿尤物麻麻 | 麻豆蜜桃视频 | 亚洲激情在线播放 | 中文字幕无码乱码人妻日韩精品 | 天堂成人av | 日韩精品五区 | 91第一页| 无码人妻丰满熟妇啪啪网站 | 麻豆网站视频 | 国产视频手机在线 | 97视频免费在线观看 | 午夜激情视频在线观看 | 国色天香一区二区 | 夜夜爽天天干 | 13日本xxxxxⅹxxx20 | 青青草好吊色 | 天堂a视频 | 日韩中文字幕av在线 | 女人逼视频 | 男女扒开双腿猛进入爽爽免费 | 国产六区 | 亚洲黑丝在线 | 美女福利视频在线观看 | 黄色大片儿. | 亚洲欧美在线观看 | 国产jzjzjz丝袜老师水多 | 玖玖在线资源 | 日韩免费精品 | 国产成人久久精品 | 波多野结衣中文字幕一区二区三区 | av中文字幕网| 日本在线免费 | 久久精品成人 | 美女视频黄是免费的 | 国产激情自拍视频 | 美女视频免费在线观看 | 国产亚洲欧美在线 | 性欧美极品另类 | 日本一本一道 | 欧美寡妇性猛交ⅹxxx | 日本久久网站 | 黄a在线 | 国产真实乱人偷精品 | 亚洲区一区二区三区 | 国产天天骚 | 日韩视频精品 | 亚洲高清在线播放 | 国产小精品 | 欧美激情免费观看 | 污污视频免费网站 | 久久无毛 | www日本xxx| 精品1区2区3区 | 中文字幕在线观看网址 | 色综合天天综合 | 欧美一级高清片 | 国产肉体xxxx裸体784大胆 | 天天综合亚洲 | 精品人妻一区二区三区四区 | 一级大毛片| 麻豆一区二区在线观看 | 国产一区二区视频在线 | 窝窝视频在线观看 | 四虎影酷 | 欧美成人免费网站 | 网址你懂得 | 久久伊人免费视频 |