{"id":7808,"date":"2018-06-07T09:59:42","date_gmt":"2018-06-07T08:59:42","guid":{"rendered":"https:\/\/engineernewsnetwork.com\/blog\/?p=7808"},"modified":"2018-06-07T09:59:42","modified_gmt":"2018-06-07T08:59:42","slug":"create-secure-connected-devices-with-new-development-kit","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/","title":{"rendered":"Create secure connected devices with new development kit"},"content":{"rendered":"<p>As the Internet of Things (IoT) accelerates and internet connectivity is deployed into virtually every industrial segment, security threats are escalating in quantity and scale.<\/p>\n<p>These threats can ruin the reputation of those attacked, impact company financials and allow intellectual property to be stolen or destroyed.<br \/>\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-7565662001938327\" data-ad-slot=\"7585079586\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><br \/>\nWhile cryptography can be used to secure these connected nodes and the basis of the practice is understood, designers often do not know how to approach the implementation of such security.<\/p>\n<p><strong>Security for embedded products<\/strong><\/p>\n<span class=\"highlight highlight-blue\"><a href=\"https:\/\/engineernewsnetwork.com\/blog\/single-wire-serial-eeprom-from-microchip-enables-remote-identification\/\" target=\"_blank\" rel=\"noopener\">Microchip<\/a><\/span>Technology announces that its <span class=\"highlight highlight-blue\"><a href=\"http:\/\/www.microchipdirect.com\/\" target=\"_blank\" rel=\"noopener\">CEC1702 hardware cryptography-enabled microcontroller (MCU)<\/a><\/span> now supports the Device Identity Composition Engine (DICE) security standard, providing a simple way to add fundamental security to embedded products.<\/p>\n<p>A new CEC1702 IoT development kit for Microsoft Azure IoT is also available, offering designers everything needed to easily incorporate the DICE security standard in their products.<\/p>\n<p>Hackers have become increasingly sophisticated, making it imperative that system designers apply sound security principles in the development of their product.<\/p>\n<p>Developed and backed by industry experts from the Trusted Computing Group (TCG), DICE is a simple and reliable method that can be implemented in the hardware of security products during manufacturing.<\/p>\n<p>The architecture breaks up the boot process into layers and creates unique secrets along with a measure of integrity for each layer, automatically re-keying and protecting secrets if malware is present.<\/p>\n<p>One of the key benefits of using the secure boot features of the CEC1702 with the DICE standard is that it enables equipment manufacturers to create a chain of trust for multiple loads of firmware, which is especially important for customers concerned with authenticating system-critical commands, such as in applications like power plants or online server databases.<\/p>\n<p>\u201cDesigning and deploying secure devices remains a significant challenge for developers,\u201d said Ian Harris, vice president of Microchip\u2019s computing products group. \u201cImplementing security with DICE gives designers confidence that the fundamental security of their device is based on principles that were developed and reviewed by industry experts. Combined with the DICE architecture, the full-featured CEC1702 provides an easy way to add the crucial security and privacy features required by embedded systems.\u201d<\/p>\n<p>Time and ease of use are top considerations for designers developing cloud-connected solutions. The CEC1702 IoT development kit with the DICE architecture helps designers speed up development cycles.<\/p>\n<p>The kit comes with a powerful, programmable 32-bit ARM\u00a0Cortex-M4 Controller and sample code to quickly develop a secure, cloud-connected solution. Certified by Microsoft Azure, customers can develop their product with the confidence that the necessary components to connect to the internet have been vetted and certified.<\/p>\n<p>\u201cAs the IoT landscape continues to increase with security threats, customers can turn to Microchip\u2019s IoT development kit to quickly and easily connect devices to the cloud and incorporate DICE security standards in their product,\u201d said Sam George, director, Microsoft Azure IoT at Microsoft Corp. \u201cThe development kit enables customers to implement the DICE standard into a device\u2019s hardware while also benefitting from Microsoft Azure\u2019s security and privacy features.\u201d<\/p>\n<p><strong>Development tools<\/strong><\/p>\n<span class=\"highlight highlight-blue\"><a href=\"https:\/\/engineernewsnetwork.com\/blog\/rs-components-introduces-debugger\/\" target=\"_blank\" rel=\"noopener\">Microchip<\/a><\/span> simplifies adding authentication and encryption to connected devices with the CEC1702 IoT development kit.<\/p>\n<p>Key features of the kit include:<\/p>\n<p>CEC1x02 development board with a Plug-in Module (PIM) that contains the CEC1702 with integrated cryptography accelerators, saving code space and decreasing time to market<br \/>\n* Two headers compatible with MikroElektronika\u2019s extensive library of click boards\u2122, allowing for flexible design requirements<\/p>\n<p>* MikroElektronika Wi-Fi 7 click board, equipped with Microchip\u2019s ATWINC1510-MR210PB IEEE 802.11 b\/g\/n\/module, optimised for low-power IoT applications<\/p>\n<p>* MikroElektronika THERMO 5 click board, which can measure temperatures across four channels with ranges from 0 to 127 degrees Celsius and extended\u00a0range\u00a0of -64 to 191\u02daC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the Internet of Things (IoT) accelerates and internet connectivity is deployed into virtually every industrial segment, security threats are escalating in quantity and scale. These threats can ruin the reputation of those attacked, impact company financials and allow intellectual property to be stolen or destroyed. While cryptography can be used to secure these connected &hellip;<\/p>\n","protected":false},"author":1,"featured_media":7809,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[105],"tags":[4428,4425,4426,4424,4427],"class_list":["post-7808","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-design","tag-cryptography","tag-cryptography-enabled-microcontroller","tag-dice-architecture","tag-secure-connected-nodes","tag-security-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Create secure connected devices with new development kit - Engineer News Network<\/title>\n<meta name=\"description\" content=\"Security threats are escalating in quantity and scale. Secure connected devices are vital\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Create secure connected devices with new development kit - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Security threats are escalating in quantity and scale. Secure connected devices are vital\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-07T08:59:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/06\/MC1421-CEC1702-primage-hi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Create secure connected devices with new development kit\",\"datePublished\":\"2018-06-07T08:59:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/\"},\"wordCount\":627,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/MC1421-CEC1702-primage-hi.jpg\",\"keywords\":[\"cryptography\",\"Cryptography-Enabled Microcontroller\",\"DICE Architecture\",\"Secure Connected Nodes\",\"security threats\"],\"articleSection\":[\"Design\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/\",\"name\":\"Create secure connected devices with new development kit - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/MC1421-CEC1702-primage-hi.jpg\",\"datePublished\":\"2018-06-07T08:59:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"Security threats are escalating in quantity and scale. Secure connected devices are vital\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/MC1421-CEC1702-primage-hi.jpg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/MC1421-CEC1702-primage-hi.jpg\",\"width\":2100,\"height\":1500,\"caption\":\"Security threats are escalating in quantity and scale. These threats can ruin the reputation of those attacked, impact company financials and allow intellectual property to be stolen or destroyed\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/create-secure-connected-devices-with-new-development-kit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Create secure connected devices with new development kit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Create secure connected devices with new development kit - Engineer News Network","description":"Security threats are escalating in quantity and scale. Secure connected devices are vital","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/","og_locale":"en_GB","og_type":"article","og_title":"Create secure connected devices with new development kit - Engineer News Network","og_description":"Security threats are escalating in quantity and scale. Secure connected devices are vital","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/","og_site_name":"Engineer News Network","article_published_time":"2018-06-07T08:59:42+00:00","og_image":[{"width":2100,"height":1500,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/06\/MC1421-CEC1702-primage-hi.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Create secure connected devices with new development kit","datePublished":"2018-06-07T08:59:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/"},"wordCount":627,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/06\/MC1421-CEC1702-primage-hi.jpg","keywords":["cryptography","Cryptography-Enabled Microcontroller","DICE Architecture","Secure Connected Nodes","security threats"],"articleSection":["Design"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/","name":"Create secure connected devices with new development kit - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/06\/MC1421-CEC1702-primage-hi.jpg","datePublished":"2018-06-07T08:59:42+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"Security threats are escalating in quantity and scale. Secure connected devices are vital","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/06\/MC1421-CEC1702-primage-hi.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/06\/MC1421-CEC1702-primage-hi.jpg","width":2100,"height":1500,"caption":"Security threats are escalating in quantity and scale. These threats can ruin the reputation of those attacked, impact company financials and allow intellectual property to be stolen or destroyed"},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/create-secure-connected-devices-with-new-development-kit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Create secure connected devices with new development kit"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/7808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=7808"}],"version-history":[{"count":2,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/7808\/revisions"}],"predecessor-version":[{"id":7811,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/7808\/revisions\/7811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/7809"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=7808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=7808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=7808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}