Electronic Enthusiasts Network reports (article / Zhang Ying) We are in an era of the Internet of Everything. According to iResearch, in terms of the number of connections, it is expected that the number of IoT connections in China will reach 19.88 billion in 2025, with a compound growth rate of 24% from 2020 to 2025. In terms of market size, the development of China’s AIoT industry will enter a period of rapid growth in 2022. It is expected that the size of China’s AIoT market will reach 750.9 billion yuan in 2022, with a compound growth rate of 30.49% from 2018 to 2022.

Baidu AIoT security architect Lin Daozheng said: First, the arrival of new infrastructure can greatly accelerate the integration of offline digital industry chains. In this stage, many high-precision and new technology industries will be implemented; 2. The rapid development of 5G provides an important infrastructure for the Internet of Everything. Up to now, 10,000 application cases have been born under the soil of 5G. For example, smart industry and intelligent networked vehicles, Baidu’s driverless use 5G low-latency technology; three, policy promotion. The 14th Five-Year Plan has positioned the IoT industry, which will support the growth of our digital core economic industries. The IoT industry will play a very critical role in the new infrastructure.

In 2022, the AIoT industry is in a growth period, but dangers continue to emerge under the development of the industry. The international chip maker Infineon and the domestic AIoT manufacturer Baidu both have insight into the dangers in the field of network security. What are their solutions? The author will analyze them in detail for you.

What are the hidden dangers of IoT security?

With the dramatic increase in IoT devices, the security of the global IoT market has seen more threats.

Infineon’s observation is that there are four major hidden dangers in IoT security: First, most of the current IoT terminals lack an authentication from the early stage of device design, and lack of consideration of access control and other security mechanisms. 2. There is a situation in the IoT system that the communication data is not encrypted on the link, which will make the user’s private data and the security data of enterprise operation and maintenance very vulnerable to interception and leakage. 3. Many IoT devices frequently update their firmware. It is difficult for ordinary users to distinguish between software sources and firmware sources, and it is very easy to be controlled by firmware attacks from illegal sources. 4. At present, routers and cameras are the two types of IoT devices that have been attacked the most. The number of routers attacked exceeds 50 million, and the number of cameras controlled exceeds 10 million.

In terms of Baidu’s intelligent IoT platform, more than 100 million devices have been connected to the platform, and workers need to process more than 50 billion pieces of data every day. Baidu AIoT security architect Lin Daozheng said that while the Internet of Things is developing rapidly, we have deep concerns about network security. Mainly from four aspects: 1. With the era of the interconnection of all things, the frequency of attacks on each device is getting higher and higher; 2. The IoT industry has rich application scenarios, which brings complexity to the supply chain and secure research and development. In firmware development, 80% of the software uses third-party libraries, but most manufacturers do not pay attention to introducing component security issues, and most manufacturers do not plan to regularly update third-party libraries. Third, data security is weak, Data from more and more large factories are being attacked by hackers; Fourth, the IoT market is fragmented, and the forces of all parties in the market are dispersed in a network, and the ecological parts are overlapping, so that advanced technologies cannot be shared without hindrance, and risk problems can only be partially contained , unable to form a united front. These four major parts increase the security cost of enterprises.

What is the solution to IoT security?

“If Infineon’s OPTIGATMTrust security chip is integrated in the camera, it can well ensure the data encryption of the communication link of the camera. Even if the data is intercepted, it cannot be deciphered into the original data, especially the very critical data. User personal account or password.” Cheng Hao, Marketing Manager of Infineon Technologies Greater China Security Interconnection System Division, pointed out.

From the perspective of product performance, Infineon’s hardware-based security chips can provide stronger security storage and computing capabilities than software solutions. For example, in some scenarios where keys and certificates need to be stored, Infineon’s security chips Since the security chip already has the ability to prevent tampering, it only needs to pass the calculation once. Through some pure software methods, the number of calculations or computing power needs to reach more than 10 times.

It is reported that Infineon’s security chip family OPTIGATM has at least passed the certification of CC EAL 4+. Currently, for products in the IoT market, Infineon has a chip OPTIGATM Trust M product that has reached the certification of CC EAL 6+. The previous CC certification Most of them are for the certification of financial IC cards or bank cards that require very high security.

For the domestic market, Infineon has launched OPTIGATMTrust M2 ID2 products. Cheng Hao shared: “This is a customized product we launched in cooperation with Alibaba Cloud. This product will pre-program the ID information that Alibaba Cloud assigns to IoT devices into the wafer during our wafer production stage. All IoT devices will transmit this information to the network side after accessing the network and the services of Alibaba Cloud’s ID party. All subsequent network link transmissions and Internet access of IoT devices will pass through this ID party The IoT security certification is a prerequisite to ensure the data security of IoT device connections.”

In Baidu’s view, there are five key points for the security of the Internet of Things.

Lin Daozheng’s view is: First, it is endogenous security. At the beginning of the establishment of an enterprise’s project, it needs to take security factors into consideration, and the entire security guarantee should run through the life cycle of all products.

Second, the protection of the entire link of the cloud management terminal, when IoT manufacturers trade equipment, the back of the equipment is an APP, which is a cloud service, and overall protection must be carried out for security.

3. This year, the state has successively promulgated the “Cybersecurity Law” and the “Personal Information Protection Law”. Under the background conditions, enterprises need to comprehensively consider compliance issues. At present, market personnel have very mature solutions for data collection, data storage, data circulation, and data use. Enterprises can choose which time period is more mature according to their own business conditions.

4. Safe and reliable construction. For example, Infineon’s chips provide security and trustworthiness at the hardware level. A secure and trusted architecture, it can also help our data compliance in reverse. For example, the safety of the car, and the safety of financial transactions, etc.

Fifth, the simulation of security attack and defense, there is actually a concept behind this, that is, the continuous security operation of IoT devices. Baidu has practice in these areas. Baidu has implemented information security technologies developed by Baidu in smart homes, unmanned vehicles, smart wearable scenarios, industrial scenarios and park scenarios. Taking the Baidu smart speaker Xiaodu business line as an example, in the product project approval stage and the demand stage, the Baidu security department will have a special security review link and a separate security demand pool.

Baidu’s security department has developed many specialized targeted security components to help them discover security issues in coding. We do corresponding security training. In addition, the security department is still sorting out security issues in the supply chain for Xiaodu, and has submitted more than 150 security vulnerabilities to supply chain manufacturers.

Baidu and Huawei jointly initiated the establishment of the OASES Intelligent Terminal Security Ecological Alliance. Lin Daozheng said that the alliance has four main tasks: first, to explore cutting-edge security technologies; second, to lead the global standards for IoT standards; Some offline activities of the Security Alliance.

Original title: Hacking! Camera data leak! How to build IoT security, well-known manufacturers for you!

Article source: [WeChat Public Number: Electronic Enthusiasts Network] Welcome to add attention! Please indicate the source of the article reprint.

Reviewing Editor: Tang Zihong

Leave a Reply

Your email address will not be published.