首页| 行业标准| 论文文档| 电子资料| 图纸模型
购买积分 购买会员 激活码充值

您现在的位置是:团子下载站 > 通信网络 > Securing Pervasive Connectivity

Securing Pervasive Connectivity

  • 资源大小:0.28 MB
  • 上传时间:2021-08-31
  • 下载次数:0次
  • 浏览次数:42次
  • 资源积分:1积分
  • 标      签: IDM 物联网 mcu

资 源 简 介

Securing Pervasive ConnecTIvity   随着物联网的演变,随意连接的前景。这反过来又推动安全性脱颖而出,因为它已经变得越来越重要,它现在触及的数据和控制路径的每一步,使其成为所有应用程序的积分。没有比这更明显的设备,将坐在‘边缘’的网络,节点将形成‘物’在物联网。   如果离开无担保,每一个这些‘东西’代表容易访问到另一个私人网络,提高在每一个垂直部门的关注与生产利用物联网的希望。因此,集成设备制造商(IDM)正在越来越大的长度,加上先进的安全功能,他们所有的最新产品。   就像目前存在的威胁的多样性,安全功能来在许多形状和大小,并在那些旨在提供原始处理性能的设备和那些将引入智能从边缘到网络之间的变化。这些MCU的目的是使边缘设备,如智能传感器和远程访问的驱动器,将需要更先进的安全功能,在较小的,低功耗;面临的一个挑战,每个IDM想要开发物联网的潜力。     A level of trust   The specific requirements of a node on the IoT will be dependent on how it is deployed; a device connected to a wired supply, such as a thermostat, may be less concerned with ultra-low power consumpTIon than, say, a remote sensor. An actuator on a piece of manufacturing equipment would have access to all the power it needs, while a wearable device may need to harvest the energy it uses from its surroundings. What they do have in common, however, is a need to carry out their prime objecTIve securely.   Fortunately, the need for security in a microcontroller has not just been ‘forced’ upon the industry; there have always been applicaTIons that value security, it’s just that the volume of devices expected to contribute to the IoT in the next decade or so will drive demand for these devices much higher than it has been in the past.
VIP VIP