国产无遮挡a片又黄又爽漫画丨成人aⅴ视频丨一级做a爱片性色毛片丨亚洲天堂午夜丨日韩一区二区三免费高清丨岛国在线视频丨亚洲国产精品嫩草影院丨无码手机线免费观看丨亚洲综合成人网丨亚洲 欧美 动漫 少妇 自拍丨男人亚洲天堂丨jizz成熟丰满老女人丨勾搭足浴女技师国产在线丨成人免费mmmmm视频丨亚洲精品无码av人在线观看丨av黄色影院丨天堂网www天堂在线资源丨91色在线丨天天干天天爱天天射丨久久精品成人免费国产片桃视频

Security May Be the ‘Short Board” Restricting Development of IoT, and HED Takes the Lead To Become A Leader in the IoT Security Field

Source: 華大電子
 Release Time: 2020-04-22

According to the Buckets Effect, how much of a bucket filled with water, depends on the shortest piece on the sides of casks. IoT industry with access to 5G shows rapid growth, but the security would become the “short board” restricting its development.

 

For individual customers, the security protects their privacy against infringement when they use connected devices; for enterprise end users, the security holds them harmless against suffering immeasurable losses caused by hacker attacks; and for IoT service providers, the security means more trustworthy products and solutions. Simply put, the security cannot be overemphasized. Yet the reality is that the IoT industry is far from paying enough attention to security.

IoT devices, for instance, have only a simply default password when leaving the factory; for another example, manufacturers only use initial encryption method, and so on. Only in the past 2019, IoT security news emerged in endlessly-millions of IoT cameras were reported to have major vulnerabilities; a 14-year-old hacker was able to control up to 4,000 IoT devices, and there was also a security scandal about Ring, one of Amazon’s fire security products…

Based on this status quo, what security awareness should IoT enterprises establish? How can we safeguard the safety and reliability of IoT devices?

With these questions, the author had in-depth exchanges with Ma Jing, General Manager of Sales Center of CEC Huada Electronic Design Co., Ltd. under CEC. Ms. Ma believed that massive amounts of unsafe connected devices may cause physical accidents, and the security is becoming the key factor restricting the development of IoT. Meanwhile, the software alone can no longer meet the IoT security demand, so the industry urgently needs the hardware to address the security weakness.

Why is it said that “software alone can no longer meet the IoT security demand” ?

In the era of Internet, terminals are generally on the user side, and the connection between the device and the man is very close. With the IoT age coming, tens of billions of devices are widely deployed in every corner of the globe, and attackers can easily launch two types of attacks:

Local attack: Hackers can conduct a reverse analysis of IoT devices or obtain the codes and work mechanisms of devices through hardware and software, so as to launch remote network attacks on servers or IoT devices.



Remote attack: By way of example of man-in-the-middle attacks, hackers can eavesdrop on communication data of the IoT devices and the cloud, so as to analyze and obtain some sensitive data from interactive information.

The author noted that foreign media reported last April that a security research organization disclosed unprecedented security vulnerabilities of IoT cameras, covering more than 2 million surveillance cameras. These cameras use a P2P communication software component of iLnkP2P developed by a domestic manufacturer. This component contains two vulnerabilities. Among these, the iLnKP2P authentication vulnerability allows attackers to intercept the connection of the devices and perform man-in-the-middle attacks and remotely control devices for eavesdropping, passwords stealing and remote invasion.

This shows that the software alone cannot effectively protect the security of IoT devices. Considering these existing pain points, HED launched professional IoT security SE chips, providing higher security protection for the IoT through hardware.

“In having communications between the IoT device and the cloud, random numbers are often introduced to ensure that even the same data is not the same on the communication links,” said Ma Jing, “although the software can achieve this function, the random number algorithms conducted by the software leave data exposed to a greater risk of being cracked as a result of the big data analysis, while the hardware can generate random numbers in the true sense through thermal noise or chaos principle of semiconductors, greatly improving the security level of anti-tapping and anti-tampering. ”

Further, power consumption attacks are also common; to be specific, there is a difference in power consumption when the device calculates 0 or 1, and the hackers may use the difference in physical power consumption to conduct reverse reasoning of data. To settle this problem, the IoT security chips can remove the difference of power consumption information occurring in the calculation of data by devices, and also can interfere with data, effectively preventing hackers from obtaining calculated data.

HED’s SE security chips are far from merely encrypting data

“Encryption does not mean security, and security chips are not just cryptographic algorithms,” Ma Jing concluded, “security threats in IoT applications include both single product security, such as anti-copying boards, local data storage security, and device networking security, such as device identification, identity authentication, data encryption transmission and OTA security upgrade.” Therefore, as an originator of the concept “security chips” of IoT, HED summarizes the requirements of IoT security in the following four aspects: device identification, bi-directional identity authentication between the device and the cloud, encrypted data transmission and remote OTA security upgrade.

To meet above requirements, the IoT security should contain a safe environment, safe data protection and safe processing flow, all of which are indispensable. Based on this, HED’s SE security chips have three functions including sensitive information protection, data transmission encryption and identity authentication.

 

The security needs to be paid great attention to from one end to another end of IoT, and the security awareness needs to be cultivated and accumulated for years. This puts forward higher requirements for security service suppliers. Domestically, HED has been awarded “Prize of Most Influential Enterprise in IoT Security” for three consecutive years, showcasing its excellent strength in the security chip field.

Although the term “Internet of Things” was coined not long ago, all kinds of smart card devices belong to the IoT devices in a broad sense, and have long-term requirements on security. Therefore, HED has carried certain IoT security genes since its inception. By now, HED has become a global supplier of smart card security chips and also one of the largest security chip suppliers.

In addition, to correspond to international algorithms, China has launched cryptographic algorithms with independent intellectual property rights, which is generally known as Chinese cryptographic algorithms. Currently, HED has developed a variety of security chips supporting both international algorithms and Chinese cryptographic algorithms. Its product security has passed the certification of many third-party testing agencies and obtained security qualifications of China Cryptogram Certification Level 2, UnionPay Chip Security, EAL4+/EAL5+, etc.

What’s more, as an important hardware product, HED’s SE security chips have internal software support, including an operating system and a file system, among other systems, so as to meet security needs of different scenarios and businesses. By combination of hardware and software, the SE security chips can provide customers with tailored security services.

Of course, in addition to security, low power consumption is also a factor that IoT devices need to focus on. HED also developed the ultra-low-power consumption security chip, with its standby power consumption less than 1μA and its large operating power consumption not exceeding 10mA. This chip can meet higher requirements on standby power and operating power consumption which the IoT puts forward aiming at security chips.


Which fields should pay more attention to the IoT security?

The IoT, ranging so wide, develops at different rates in different industries and has different degrees of security requirements in subdivided fields. So, the IoT segments involving people’s life, property and privacy security desperately need the IoT security chips.



In the IoV field, smart cars, as a mobile IoT carrier, use a wide variety of technologies internally. This also means that they face greater information security risks. The Guideline for Developing National Internet of Vehicles Industry Standard System released by the Ministry of Industry and Information Technology of the People’s Republic of China and Standardization Administration of the People’s Republic of China at the end of 2017 lists the information security construction as an important part of the intelligent connected vehicles standard system. By now, HED’s SE security chips can not only provide various levels of information security protection for passenger vehicles, but also help the government effectively monitor whether automobile exhaust pollutants of commercial vehicles meet the “China VI Vehicle Emission Standards”, realizing the innovation application of IoV security chips. This is a milestone breakthrough for a Chinese chip supplier.

In the smart security field, China has built the world’s largest video monitoring network with years of efforts. However, the security situations of our smart safeguard systems are hardly optimistic. The Technical Requirements for Information Security of Video Surveillance Network System for Public Security (GB35114-2017), the technical standards established by China in respect of the information security of video surveillance network, were officially implemented in November 2018, becoming the technical basis for comprehensively improving information security in the field of public security video surveillance. So far, HED has developed the security chips conforming to specifications A/B/C of GB35114, providing safeguard for various security needs.

In the smart metering field, the metering industry has evolved from mechanical metering to smart IC card metering, and to the present IoT metering. While solving the functional issues in the smart, digital, and information aspects, IoT technologies are susceptible to serious security threats in terms of the network and information security. To respond to these serious security threats, HED works with partners to provide a complete set of IoT security solutions for the smart metering industry, so as to effectively protect the data security of IoT metering, keep the property and privacy security of users, and safeguard the healthy development of the smart metering industry.

Besides, HED’s SE security chips and its solutions are widely applied in smart home, smart door locks, etc, providing both security safeguard for products and anti-counterfeiting solutions for accessories and consumables.

The IoT security needs joint efforts

Only after a long-term continuous improvement and evolvement and joint efforts of the industry is IoT security safeguarded. HED, as a pioneer in the security chip field, has explored a set of effective solutions for the IoT security, but the maturity of this industry needs the concerted efforts made by all enterprises.

 

 

Fortunately, some enterprises and management agencies have become the “leaders” in the IoT security field, and the whole IoT industry is increasingly paying attention to the security. With this, the security is expected to be greatly improved.

At the industrial level, the 2019 China Cybersecurity Development White Paper released by CCID showed that the IoT security market size in China reached RMB 8.82 billion and hit an annual growth rate of 34.7% in 2018. According to Gartner, the expenditures of the IoT security are estimated to reach USD 3.1 billion by 2021. Therefore, how to settle the IoT security issues is one of main concerns of enterprises.

In terms of policies, since 2017, the Chinese laws and regulations have been promulgated one after another, such as the Cybersecurity Law of the People’s Republic of China, the Cryptography Law of the People’s Republic of China, the Regulations on Protection of Critical Information Infrastructure Security, and the Regulations on Classified Protection of Cybersecurity. This means that importance of security is constantly increasing and has become a key point which cannot be ignored at the policy level.

For sure, the IoT security willcertainly become more and more important in the future, so it’s high time that all the companies consider how to safeguard the product security before security issues exist out there.


Source: Internet of Things Think-tank

Share
  • toolbar
    Back to Top
丝袜中文字幕 | 欧美日韩在线观看视频 | 又白又嫩毛又多15p 黄免费看 | 国产传媒视频在线观看 | 婷婷色综合网 | 亚洲性生活片 | 国产又黄又爽视频 | www.一起操| 国产欧美色图 | 精品久久在线观看 | 免费毛片在线 | 成人毛片在线观看 | 色爽网站| 中文字幕一二三区 | 亚洲色图欧美视频 | 国产激情视频在线 | 凹凸日日摸日日碰夜夜 | 国产51视频 | 中国国产毛片 | 免费成人黄色网址 | 男女午夜爽爽 | 色激情综合 | 成人免费视频网 | 欧美色老头old∨ideo | 亚洲国产精品成人av | 97福利 | 玖玖爱国产 | 美脚の诱脚舐め脚视频播放 | 久久艹国产 | 日韩视频专区 | 噜噜噜在线视频 | 玖玖热视频 | 麻豆入口 | 国产精品丝袜黑色高跟鞋 | 黄视频免费看在线 | 日日骚av一区二区 | 手机av免费观看 | 久草免费在线播放 | av漫画在线观看 | 一级大毛片| 女人洗澡一级特黄毛片 | 伊人久久爱 | 久久一精品 | 日本五十路女优 | 波多野结衣网址 | 中国黄色一级视频 | 1024日韩 | 91射区| 欧美一区二区三区在线观看视频 | 亚洲欧美日韩一区二区三区四区 | 日本电车痴汉 | 国产精品久久久久毛片大屁完整版 | 嫩草国产| 可以在线看的av | 日韩在线一区二区三区四区 | 美脚の诱脚舐め脚视频播放 | 完美搭档在线观看 | av免费观看网址 | 91成人免费在线观看 | 男生和女生一起差差差视频 | 成人在线观看免费全集高清完整版 | 国产在线免费视频 | www日日日 | 亚洲五月花 | 玉女心经 在线 | 在线视频h | 日韩怡春院 | 91高清免费| 99视频这里有精品 | 国产乱人| 欧美美女在线观看 | 国产亚洲无码精品 | 亚洲天堂第一 | 日韩久久一区 | 国产丝袜在线视频 | 亚洲视频www | 国产精品久久毛片 | 精品国产三级 | 亚洲人体视频 | 最好看的mv中文字幕国语电影 | 亚洲一区久久久 | 向日葵视频在线播放 | 久草福利资源 | 婷婷五月在线视频 | 色优久久 | 在线观看日韩精品 | 中文字幕在线观看视频网站 | 久久精品网址 | 与子敌伦刺激对白播放的优点 | 国产在线观看第一页 | 激情伊人网 | 青青草狠狠干 | 色婷婷久久 | 国产精品毛片视频 | 天堂网视频 | 91av在线看 | 先锋成人 | 乱色精品无码一区二区国产盗 | 女人喂男人奶水做爰视频 | 国产精品久久网 | 无码少妇一区二区三区 | 久久久久中文字幕 | 这里有精品 | 亚州欧美 | 亚洲人交配 | 自拍第二页 | 在线黄网 | 香蕉av777xxx色综合一区 | 玖玖在线免费视频 | 免费h漫禁漫天天堂 | 色一情一乱一伦 | 男女视频在线免费观看 | 亚洲一区中文字幕在线观看 | 快射视频在线观看 | 瑟瑟网站在线观看 | 精品在线观看视频 | 欧美天堂在线观看 | 欧美激情区 | 日本一本高清 | 初尝黑人巨炮波多野结衣 | 亚洲欧美日韩精品在线 | 五月婷婷六月丁香综合 | 夜夜操狠狠操 | 亚洲福利精品 | 激情深爱| 色播导航 | 在线日韩一区二区 | 饥渴放荡受np公车奶牛 | 日韩性爰视频 | 国产午夜av | 国产一区二区不卡在线 | 天堂av影视| 亚洲午夜激情视频 | 午夜天堂影院 | 国模无码大尺度一区二区三区 | 午夜精品无码一区二区三区 | 日本成人久久 | 国语对白| 我们的2018中文免费看 | 国产在线欧美 | 黄色a级片 | 国产在线不卡视频 | 欧美成人日韩 | 国产一级二级三级在线观看 | 久久久久久av无码免费网站 | 99成人免费视频 | 五月天开心网 | 国产精品久久久久久亚洲影视 | 亚洲国产日韩一区 | 玖玖在线视频 | 精品人妻无码一区二区 | 免费三片60分钟 | 国产激情自拍 | 九色91视频 | 都市激情第一页 | 成人性生交大片免费卡看 | 色综合天天综合网天天狠天天 | 超碰蜜桃 | 国产91在线播放精品91 | 日本一区二区在线播放 | 在线免费黄色 | 韩日一区二区三区 | 欧美大片黄色 | 久久在线视频免费观看 | 国产精品美女视频 | 色噜噜一区二区三区 | 国产一级黄| 中文字幕一二 | 欧美色老头old∨ideo | 岛国片在线播放 | 插吧插吧网 | 国产乱大交 | 丝袜美女av | 女人性做爰24姿势视频 | 波多在线视频 | 人人爽人人爽人人爽 | 亚洲成人精品 | 欧美激情午夜 | 一级片aaa| 黄黄的网站 | 亚洲va久久久噜噜噜久久天堂 | 久久久噜噜噜久久久 | 国产区二区 | 日本黄a三级三级三级 | 黄页免费在线观看 | 日韩欧美在线视频 | 中文字幕人成人乱码亚洲电影 | 日本黄色美女视频 | 91性视频 | 欧美看片 | 欧美精品乱码99久久蜜桃 | 色妹子av| 欧美高清视频在线观看 | 久久久久久国产视频 | 国产一国产精品一级毛片 | 国产男女猛烈无遮挡a片漫画 | 国产老肥熟 | 一区二区三区视频 | 污视频免费在线观看 | 国语对白做受按摩的注意事项 | 欧美高清在线观看 | 在线视频 日韩 | 色偷偷av| 美日毛片 | 精品一二三四区 | 亚洲精品666 | 老鸭窝久久 | 欧美日韩精品在线视频 | 国产精品hd| 中文字幕在线播放 | 久久亚洲AV无码专区成人国产 | 欧美伊人久久 | 91超碰人人 | 日韩经典av | 日本黄色大片免费 | 国产精品视频无码 | 国产精品一区二区不卡 | 国产精品极品 | 国产精品久久久久永久免费看 | 爱爱精品| 亚洲女人被黑人巨大进入 | 亚洲丝袜一区 | 91射射| 日本一区二区三区四区在线观看 | 欧美日韩生活片 | 永久免费看mv网站入口亚洲 | 欧美成人二区 | 亚洲精品成人av | 国产精品久久久久久 | a毛片视频 | 青青草在线视频免费观看 | 国产aⅴ| 国产超碰av | 国产中出 | 精品人妻少妇嫩草av无码 | 久久久久久免费毛片精品 | 欧美体内she精高潮 狠狠爱夜夜 | 成人精品二区 | 日韩中文字幕电影 | 亚洲成人偷拍 | 97香蕉碰碰人妻国产欧美 | 亚拍一区 | 黄色片在线免费看 | 欧美永久精品 | 美女网站污 | 色视频在线 | 日本一区二区三区在线观看 | 偷拍亚洲欧美 | 红桃av在线| 无码黑人精品一区二区 | 亚洲1234区| 欧美少妇网 | av免费入口| 夜色在线视频 | 后进极品美女圆润翘臀 | 荫蒂被男人添免费视频 | 成人综合婷婷国产精品久久 | 亚洲综合精品在线 | k8经典成人理伦片 | 日本久久久久久久 | 国产精品美女一区 | 国产又粗又猛又爽又黄av | 俺也去电影网 | 蜜桃传媒视频在线观看 | 国产一级特黄a高潮片 | 最好看的mv中文字幕国语电影 | 国产3级| 国产成人久久精品77777综合 | 久久日韩精品 | 热久久在线 | 天天爽夜夜爽人人爽 | 亚洲国产清纯 | 欧美第一精品 | 91av官网 | 美女被c视频网站 | 国产成人无码一区二区三区在线 | 四虎在线免费 | 免费观看一区二区 | 欧美成人高清 | av片在线观看 | 噜噜噜噜私人影院 | 韩国成人免费视频 | 精品国产污污免费网站入口 | 一起草av | 尤物视频网站 | 久久av资源 | 超碰国产人人 | 可以看黄色的网站 | 人物动物互动39集免费观看 | 国产精品观看 | 人人爽人人香蕉 | 亚洲aaaaaa | www.黄色 | 国产精品1234 | 久热超碰| 日本日皮视频 | 欧美视频一区在线 | 国产精品美女毛片真酒店 | 伊人久久大香线蕉av一区 | 欧美在线网址 | 久久久精品久久久 | 亚洲射射| 久久久久久亚洲 | 国产日韩一区二区 | 成人图片小说 | 日日日视频 | 中文字幕成人网 | 500部大龄熟乱视频 国产免费无码一区二区 | 香蕉视频在线观看免费 | 天天狠狠操 | 精品久久伊人 | 欧美一区2区 | 男女涩涩网站 | 色综合久久网 | 99亚洲视频| 亚洲精品久久久久久久蜜桃臀 | 日本福利在线 | 亚洲乱码无码永久不卡在线 | 久久久久久久一区二区 | 免费av影视 | 天天干视频在线 | 妞干网这里只有精品 | 青青草福利视频 | 美女又爽又黄网站泳装 | 成人av软件 | 欧美大白屁股xxxooo | 91精品推荐 | 精品久久久久久国产 | 69日本xxxxxxxx96 | 日韩精品在线观看一区二区 | 狠狠躁夜夜躁 | 在线观看国产视频 | 天堂网一区二区三区 | 91麻豆网站 | 精品国产无码一区二区三区 | 美女精品一区 | 午夜av成人 | 国产又大又黄的视频 | 一区二区三区四区在线观看视频 | 韩日一区二区三区 |