IoT security in embedded systems: What are the challenges and solutions for deployment at scale?

Why IoT security matters more than ever and how to achieve it quickly and effectively at scale.

It’s hard enough to make one internet-connected device completely safe from hackers, so how do you achieve a secure supply chain for the thousands or tens of thousands of IoT devices that could be part of a global industrial network?

Here’s the end-to-end story of chip-to-cloud security.

Part 1

Scaling securely – the main barrier to adopting IoT devices in industrial applications

Go to chapter

Part 2

What’s the role of cryptography in IoT security?

Go to chapter

Part 3

What is a root-of-trust, and what is a PUF?

Go to chapter

Part 5

Now you have a secure root-of-trust, what next?

Go to chapter

Part 6

The three fundamental roles of an end-to-end IoT security platform

Go to chapter

Part 7

How IoT security must encompass both hardware and software to be effective

Go to chapter

Part 1

Scaling securely – the main barrier to adopting IoT devices in industrial applications

The Internet of Things market isn’t growing as strongly as predicted. Research firm IoT Analytics once stated by 2020 that there would be 50bn IoT devices, now there’ll only be 21bn by 2025.1,2 Meanwhile, Gartner claims that 80% of IoT projects fail before they’re even launched.3

The limiting factor has been a compromise between security and scalability, remembering that anything connected to your network can be an entry point for hackers to take control of everything on that network.

Until now, strong security has been difficult to scale and companies have struggled to bridge the IoT scaling gap cost-effectively.

How great is the IoT security threat and what’s the industry doing about it?

Cyber attacks are increasing exponentially. Forbes reported a 300% increase in compromise of billions of IoT security devices in 2019.4

Cyberattacks on UK businesses jumped a fifth in 2020.5 Horror stories abound. As a result, IoT security regulation is being developed, which will place growing pressure on businesses to conform to prescribed standards. The EU Network and Information Security Directive (NISD) imposes heavy fines for non-compliance. Singapore has its own Cybersecurity Act (CSA) and in the US, The National Institute of Science and Technology (NIST) sets out standards for safe, legal product innovation.

A person pressing a digital button

The fundamental principles underlying these standards include the need for a strong root-of-trust, secure lifecycle and key management, and a zero-trust approach to supply chain management.

Effective and economical end-to-end security can only be achieved by embracing a philosophy of security-by-design, rather than by trying to bolt it on as an afterthought. In fact, when done correctly, IoT security reduces costs throughout device lifecycles, rather than adding to them.

A woman using a smartphone to adjust room temperature

Part 2

What’s the role of cryptography in IoT security?

When IoT devices send or receive messages to a server, either in the cloud or on-premises, two fundamental conditions must exist for the data transfer to be secure.

1. The identities of the senders and recipients of data must be established beyond doubt.
As a consequence, every microcontroller or other semiconductor, such as an application-specific integrated circuit (ASIC), at the heart of each IoT device must have a unique, immutable, and unforgeable identity. This is key to effective cryptography and leads to the requirement for a root-of-trust – which we address a little later.

2. The messages must be sent in such a way that only the intended recipients can interpret them.
They must not be readable or corruptible by any device that attempts to interfere with the data in transit. This requires effective cryptography.


How cryptographic algorithms are used in the IoT

As classified by The National Institute of Standards and Technology (NIST), part of the U.S. Department of Commerce, there are three types of function generated by cryptographic algorithms: asymmetric keys, symmetric keys, and hash functions.

All three are used in a secure IoT ecosystem.

A man holding a laptop server room
Asymmetric cryptography
Asymmetric cryptography

Used for identity management through generating digital signatures and certificate requests, and for implementing key exchange mechanisms. Examples of frequently used cryptographic algorithms include RSA, Elliptic Curve and Diffie-Hellman. There is also a range of new algorithms being standardized by NIST to provide effective post-quantum cryptography.

Symmetric cryptography
Symmetric cryptography

Used for data transfer to and from connected endpoint devices. Symmetric keys are typically 128-bit or 256-bit, while it takes a 2048-bit asymmetric key to provide a broadly similar level of security to that of a 128-bit symmetric one. IoT deployments create a lot of data, so speed is important. Also, storing smaller keys requires less silicon area on semiconductor devices, where space is at a premium. The most common example here is AES.

Hash functions
Hash functions

Used for integrity checking, ensuring that received data has not been tampered with.

IoT security depends on having a unique, immutable, and unforgeable identity for each device and being able to send data securely between devices using a combination of cryptographic functions. The starting point is to ensure that your data is reaching only the intended recipients, the foundation of which is the root-of-trust.

Part 3

What is a root-of-trust, and what is a PUF?

In IoT security terms, a root-of-trust, or RoT, comprises a device’s identity and the cryptographic keys associated with it. Its purpose is to enable service providers, whose applications may reside on cloud servers or private networks, to know which devices they are talking to when data is being exchanged, and when sending instructions or updates to endpoint devices.

The RoT provides keys for secure server communications, supports secure boot when the device starts up, and secure key storage. Server-based applications use the RoT for attestation, to be sure that they are connected to the correct device.

Without a unique RoT to minimize the risk of hacking, cybercriminals and other unwelcome actors may see what data is being exchanged within a system and may be able to steal secrets or introduce instructions or code to take control of such systems, causing them to behave differently. Unwelcome actors can also pass themselves off as legitimate agents in the network. This can have disastrous consequences for system owners or operators. To understand how bad it could be, think about sitting in an autonomous vehicle when someone with destructive ambitions takes control of your brake and accelerator.


The silicon-based hardware root-of-trust

The unique identity of a silicon chip, for example, the microcontroller at the heart of an IoT device, is a string of digits – a random number. So are cryptographic keys.

You can create them in software, but random numbers generated in software are perhaps better described as ‘pseudo-random’ because the source of randomness may simply be the system clock. The degree of randomness, or entropy, of a system is one the primary factors that determine how difficult it is to hack. The more random the number (strictly, the higher the entropy of the number), the more secure the system.6

A hardware security module (HSM) can be used to generate more secure keys to be injected into devices on the production floor or remotely. However, this process is extremely expensive – the relevant clean rooms cost millions each year to run – and comes with risks. It involves multiple third parties in the supply chain, multiplying the risk of malicious theft or unintentional leakage of the keys.

Fortunately, there is a more secure alternative which gives end users complete control of IoT security, from chip-to-cloud. It starts with building the seeds of the RoT into the silicon itself, exploiting ‘physical unclonable functions’.

Person in a lab with a group of purple microchip development boards

The role of physical unclonable functions, or PUFs, in hardware security

Each semiconductor chip is unique by virtue of tiny differences created in its silicon die during the manufacturing process. Such differences can be used to create physical (or physically) unclonable functions, or PUFs, which can contribute to robust security.

PUFs are used to identify silicon chips in a similar way that fingerprints, or iris recognition, are used to identify people. If you can use hardware IP to generate the identities and keys it is far more secure than the common practice of injecting these, and significantly less expensive. However, not all methods of creating such a fingerprint are equally secure or equally cost-effective.

A close-up of a computer chip

Identities and cryptographic keys are generated on demand to eliminate the need for storage

Crypto Quantique’s hardware IP – QDID™ – enables multiple identities and their related cryptographic keys to be generated in silicon on demand. No secure key storage is needed, enabling on-chip memory to be reserved for other functions and making IoT systems less susceptible to side-channel attacks.

Such attacks try to extract data from devices by accessing, measuring, and analyzing physical parameters like timing, current consumption, and electromagnetic emissions. If you don’t need to store the keys, this risk is minimized.

Part 4

Are all PUFs equally secure?

For an IoT system to be secure today and in the post-quantum era, its RoT must be based upon quantum-driven entropy, or randomness. What does this mean?

PUFs can be categorized by how the variations in silicon chips are measured or by how the randomness is derived. First-generation PUFs were derived by measuring physical characteristics. They are less secure than second-generation PUFs, which are derived from measuring quantum effects.

The quantum computing era will demand quantum-driven security for IoT systems. And even if that era has not yet arrived, quantum-driven security gives better protection for today’s systems too.

It is also worth noting that first-generation PUFs typically generate only a single seed for random number generation, and often still rely on key injection for additional cryptographic keys – such keys residing in secure non-volatile memory. Fundamentally, these devices don’t solve the security or cost issues at the heart of IoT.

The quantum advantage

QDID exploits randomness in the thickness of an oxide layer on silicon wafers resulting from manufacturing variability. The extent of quantum tunnelling – a phenomenon whereby electrons propagate through barriers in the fabric of the wafers – varies with the thickness and atomic structure of the oxide layer.7 QDID measures these quantum effects to generate multiple, uncorrelated cryptographic keys inside the silicon chips made from the wafers. The keys can be used for identities, cryptography, and authentication.

This unique approach eliminates the need for keys to be injected or stored, simultaneously reducing system costs while increasing security. Crucially, having multiple, uncorrelated keys also results in the microcontroller (or other device containing the QDID) to be usable for multiple purposes, and even to be passed to a new owner, allowing secure use of the IoT device.

A woman in a lab coat and gloves working on a laptop

The world’s most secure hardware root-of-trust

Read more about how quantum tunnelling works and QDID’s impact on your IoT device security

More about QDID

Part 5

Now you have a secure root-of-trust, what next?

So, you have an IoT endpoint device with an integral, secure identity and the ability to produce multiple, secure cryptographic keys on demand.

How do you connect it to your application without compromising that security?

The major cloud providers all offer some elements of what you need if you’re familiar with using APIs or are happy to spend a lot of time writing your own. But there is a void between hardware, embedded systems and cloud computing that you need to bridge, and it can become a complex and frustrating process. In industrial applications, engineers are skilled in the systems and protocols that have come to dominate the industry in recent years. PLCs, Modbus, RS432, and Ethernet are familiar terminology.

Cryptography is like a new language and one that’s not easy to learn. That’s why security has been one of the factors holding back the wider IoT adoption in these applications and others.

A platform that solves IoT security challenges

What’s needed is a universal platform, hosted on a server, that connects IoT devices to the cloud, or several clouds, quickly and easily. And it needs to be a platform that does not demand cryptographic expertise to use it. After all, think how many fewer car drivers there would be if they had to be qualified mechanics to get behind the wheel.

A man in a white coat and tie using a tablet

QuarkLink™ easily secures and connects devices safely

QuarkLink is one platform that addresses this challenge, without compromising security, without you having to depend on third-party support, and without you having to connect devices one at a time. It will work with RoTs from Crypto Quantique’s partners and, most securely, with devices that employ Crypto Quantique’s QDID, quantum-driven RoT hardware IP.

The universal IoT security platform

Read more about how QuarkLink connects with roots-of-trust to increase security and accelerate scalability.

More about QuarkLink

Part 6

The three fundamental roles of an end-to-end IoT security platform

An end-to-end IoT security platform has to perform three main roles:

Provisioning
Provisioning the IoT devices.
Onboarding
Onboarding those devices to a server so that they can access applications.
Managing
Managing the devices throughout their lifecycle.
Here’s how QuarkLink tackles these tasks to deliver seamless cloud connectivity.
IoT security flowchart

1. Provisioning IoT devices

Provisioning means configuring IoT devices so that they can do something with the data that they collect – the temperature readings from sensors, for example.

QuarkLink is used to execute the following steps in the provisioning process:

  • Inject firmware securely
  • Generate device identities and cryptographic keys
  • Encrypt and sign the firmware so that only the IoT device can decrypt it
  • Enable secure boot processes

2. Onboarding IoT devices

So far, the server doesn’t know anything about endpoint devices. They haven’t been onboarded. QuarkLink authenticates the IoT devices before providing certificates and credentials for secure onboarding. It is then used to:

  • Define device batches within the IoT system
  • Import device identities into QuarkLink
  • Assign a server policy to each batch
  • Link the batch with a chosen cloud account and its privileges

Thousands of devices can be onboarded to multiple servers in just a few minutes.

QuarkLink connects to all major IoT hubs including AWS, Azure, Mosquito and others. It is equally capable of working with private clouds or other services. QuarkLink is then used to manage IoT devices throughout their operating lifetime.

Perhaps most importantly, QuarkLink gives full control to the user in preserving security and privacy. And while it currently supports AWS, Microsoft Azure, and Mosquito cloud servers, QuarkLink is infrastructure-agnostic and can be adapted to work with any server – including those within private networks. What’s more, it can secure any microcontroller or ASIC if either QDID or an alternative RoT is available.

3. IoT device management

The management of IoT devices has five main facets:

  • Monitoring their functional integrity to ensure that they have not been compromised by a cyberattack.
  • Firmware signing and encryption to enable secure updates over the air (OTA).
  • Key and certificate renewal, which may be needed after the system has a fault or needs reconfiguration.
  • Device revocation if it is compromised and must be disconnected from the server.
  • Subsequent re-onboarding if the device is being passed to a new owner.

QuarkLink enables system owners and operators to manage all of these functions via a simple graphical user interface based on drop-down menus and action buttons.

A laptop with the Quarklink application dashboard on the screen

Part 7

How IoT security must encompass both hardware and software to be effective

The IoT security market is now awash with software vendors promising secure solutions.

But however smart the tools appear to be, the fundamentals of cybersecurity do not change.


Here are the most important questions you need to ask, and why.

Hardware software
Are device identities created in hardware or software?

If the answer is software, there is always the risk that someone else’s software may compromise security.

Cryptokey
If the identities are created in hardware, how are these and the associated cryptographic keys generated?

If this is done by measuring physical parameters, there may be a good degree of entropy, but the outcome is still deterministic. Such a solution may provide a reasonable level of security today, but its efficacy may well be compromised in the post-quantum computing environment that is just around the corner.

Integrated
How comprehensive and well-integrated are the hardware and software elements of the solution?

To maximize security, you need to minimize the involvement of third parties by selecting a fully integrated, chip-to-cloud security architecture.

Q:Architecture, which comprises the QDID quantum-driven hardware IP block and QuarkLink universal IoT security platform, was designed from the ground up to meet not only today’s IoT security challenges but also those that will arrive in the wake of quantum computing. Scalable IoT security has never before been so powerful, and yet so easy to implement.

Q:Architecture has closed the IoT security gap.

A man sitting at a desk using a laptop in a lab

Watch this 10 minute demonstration

See the QuarkLink universal security management platform in action

Quantum tunnelling effect

Want to take end-to-end control of scalable IoT security?

Please contact us to discuss how we can help.

Contact us