{"id":24672,"date":"2014-07-11T10:40:56","date_gmt":"2014-07-11T14:40:56","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24672"},"modified":"2014-07-11T10:40:56","modified_gmt":"2014-07-11T14:40:56","slug":"mcus-memory-balance-security-performance","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/mcus-memory-balance-security-performance.php","title":{"rendered":"MCUs, Memory Balance Security, Performance"},"content":{"rendered":"<p><p>    TORONTO  As the number of connected devices increases    exponentially, so does the need for encryption. Thanks to the    BYOD phenomenon, self-encrypted SSDs are finding their way into    the enterprise to secure data regardless of operating system,    while the Internet of Things is also driving the need for    encryption, and in some cases it makes sense to do it at the    micro-controller (MCU) level.  <\/p>\n<p>    Adib Ghubril, research director at Gartner, said there are a    number of benefits to encrypting data at the micro-controller    level, including performance, power efficiency, and improved    data protection. Since security is implemented at the hardware    level its more difficult to hack, he said.  <\/p>\n<p>    Of course, any application running a wireless interface    benefits from encryption, Ghubril noted, including networked    appliances such as smart meters or any intelligent IoT devices,    and many of these devices are best enabled by MCUs, including    encryption for their wireless payloads.  <\/p>\n<p>    Microchip Technology recently expanded its line of eXtreme Low    Power (XLP) PIC MCUs with the PIC24F GB2 family that includes    an integrated hardware crypto engine, a random number generator    and one-time-programmable key storage for protecting data in    embedded applications.  <\/p>\n<p>    Alexis Alcott, product marketing manager for Microchips MCU16    division, said the GB2 devices include up to 128 KB Flash and 8    KB RAM in small 28- or 44-pin packages, and are targeted at    battery-operated or portable applications such as IoT sensor    nodes, access control systems, and door locks. She said one of    the chief concerns of customers is securing devices and data    without hurting battery life, and many IoT devices are part of    larger systems sharing data through Bluetooth or WiFi    connectivity, which must be secure.  <\/p>\n<p>    Wearables, including medical devices, are one of the fastest    growing IoT segments for Microchip, said Alcott, and securing    sensitive medical information, particularly from patients, is a    chief concern. Another scenario she described was use of    sensors to monitor humidity levels in a museum, which would    turn on periodically to gather data and send it to central    location. The device itself would not process the information,    but it would have to be encrypted both at rest and while being    transmitted, said Alcott. The recipient of the data must    decrypt the data to read it.  <\/p>\n<p>    Given the number of small devices that might be distributed,    performing maintenance on the devices, including battery    replacement, is costly and time consuming, and Alcott said    providing encryption at the MCU level allows for more efficient    power consumption, since less software overhead frees up CPU    bandwidth and memory, and Microchips GB2 devices operate at a    lower CPU frequency to save power.  <\/p>\n<p>    Ghubril said Microchips offering is not particularly unique    from an encryption perspective, but one of the most power    conscious. Many vendors are offering MCUs with encryption    features, he said, including Spansion, STMicro, NXP, Infineon,    and Toshiba.  <\/p>\n<p>    One of the chief concerns of users when adding features such as    encryption to MCUs and SSDs is their effect on performance. A    survey released by the Storage Networking    Industry Association earlier this year found respondents had    little interest in using built-in encryption features. Even    though many SSDs being shipped today have data protection and    encryption features built in, often those capabilities are not    being switched on by OEMs, due to the misconception that    encryption can reduce performance.  <\/p>\n<p>    Meanwhile, the major SSD makers have been releasing updated    self-encryption devices (SEDs). At the beginning of year,    Samsung added new features to its 840 EVO SSD that work    with third-party security software, while SanDisk announced in    May early members of its ecosystem of ISVs for security    management to support its recently announced X300 SSD, the    companys first self-encrypting SSD based on TCG Opal 2.0    specifications.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.eetimes.com\/document.asp?doc_id=1323041&_mc=RSS_EET_EDT\/RK=0\/RS=UPuYpnQ5EzcvN735PNDcOilMyzM-\" title=\"MCUs, Memory Balance Security, Performance\">MCUs, Memory Balance Security, Performance<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> TORONTO As the number of connected devices increases exponentially, so does the need for encryption. Thanks to the BYOD phenomenon, self-encrypted SSDs are finding their way into the enterprise to secure data regardless of operating system, while the Internet of Things is also driving the need for encryption, and in some cases it makes sense to do it at the micro-controller (MCU) level. Adib Ghubril, research director at Gartner, said there are a number of benefits to encrypting data at the micro-controller level, including performance, power efficiency, and improved data protection<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24672","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24672"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24672"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24672\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}