Security is not a bolt-on feature, it needs to be built into your IoT and wearable devices
Security can not be an afterthought for IoT and wearable devices, it must be designed in from the very beginning. It must be addressed in all phases of the project, including system design, test and validation.
Security tradeoffs and implementation will impact
Hardware requirements and power consumption
Testing and validation
Why is IoT different than traditional cybersecurity?
Hardware is often in uncontrolled locations
Limited processing power of end nodes
Here are some good resources on IoT security that highlight the importance of security and its difficulty in small embedded devices. We are familiar with resources such as these and can use them to design your product.
Lars Lydersen, Senior Director of Product Security at Silicon Labs, presents the different layers of security needed for IoT/wearable devices. He explores some of the most common security pitfalls in embedded applications.
In “IoT Security: The Ugly Truth,” Mike Muller, CTO at ARM, shows that the knowledge and experience are readily available, but need to be adapted and equipped to effectively interact with the Internet of Things.
Secure Push provides a unique Signalwall technology for IoT devices.
Intrinsic ID also provides an interesting device authentication technology.