Get Help On Your Device Design
Company / News

Security is not a bolt-on feature, it needs to be built into your IoT and wearable devices

post_banner

Share:

Security can not be an afterthought for IoT and wearable devices, it must be designed in from the very beginning. It must be addressed in all phases of the project, including system design, test and validation.

Security tradeoffs and implementation will impact

  • Hardware requirements and power consumption
  • End-to-end connectivity
  • Testing and validation
Why is IoT different than traditional cybersecurity?
  • Hardware is often in uncontrolled locations
  • Limited processing power of end nodes

 

Security Resources

Here are some good resources on IoT security that highlight the importance of security and its difficulty in small embedded devices. We are familiar with resources such as these and can use them to design your product.

Lars Lydersen, Senior Director of Product Security at Silicon Labs, presents the different layers of security needed for IoT/wearable devices. He explores some of the most common security pitfalls in embedded applications.

intr-to
 

In “IoT Security: The Ugly Truth,” Mike Muller, CTO at ARM, shows that the knowledge and experience are readily available, but need to be adapted and equipped to effectively interact with the Internet of Things.

Secure Push provides a unique Signalwall technology for IoT devices.

Intrinsic ID also provides an interesting device authentication technology.

https://www.intrinsic-id.com/globalsign-intrinsic-id-webinar/

Wearable Medical

Wearable medical devices have additional requirements as outlined by the FDA. We have the knowledge to take care of compliance with FDA requirements.

Highly Successful Engineering Design Projects

Cybersecurity”  https://www.fda.gov/MedicalDevices/DigitalHealth/ucm373213.htm

 

“Content of Premarket Submissions for Management of Cybersecurity in Medical Devices, FDA, 2 Oct 2014, https://www.fda.gov/ucm/groups/fdagov-public/@fdagov-meddev-gen/documents/document/ucm356190.pdf

Postmarket Management of Cybersecurity in Medical Devices, FDA, 28 Dec 2016, https://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm482022.pdf

Share:

TELL US ABOUT YOUR NEXT DESIGN PROJECT

Do you have a question about our services, pricing, samples, resources, or anything else?

Contact Us Now

Related News

Volume 2020 Issue 9 Newsletter | Voler Systems

Webinar Alert! Voler Systems President Walt Maclay...

Read More

Webinar: Why Cellular Connectivity Is A Big Deal For IoT | Voler Systems

Date of Event: August 13, 2020 Paul Bradley Paul...

Read More

The IoT Journey Begins at RTECC 2015 | Voler Systems

Walt Maclay is an invited speaker at Real-Time Embedded Computing Conference (RTECC), a...

Read More

Interested in Learning More? Contact Us Today!