• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

Four major design considerations for IoT apps secure boot

January 10, 2020 By Majeed Ahmad Leave a Comment

Secure boot, the first line of defense against security breaches in embedded systems, verifies the pre-boot authentication of system firmware using a root-of-trust service and thus safeguards code and data to prevent malicious activities. It’s a critical security measure to protect connected devices like the Internet of Things (IoT) endpoints because most security breaches such as hacking and reverse engineering start with code boot.

Secure boot, the very first code that MCUs execute after the power-up or hard reset, even before the BIOS and OS run, verifies the software authenticity by showing the exact same image of the original firmware.

Figure 1: This is how secure boot works on the OEM side of connected designs in embedded systems such as smart meters, factory and building automation, and smart locks. Image: Microchip
Figure 2: This is how secure boot looks like after the system is deployed with a security-centric MCU that compares digest and verifies sign. Image: Microchip

Below are four basic design considerations that embedded engineers may contemplate to build an efficient secure boot mechanism and make sure that the boot code hasn’t been compromised.

Coding best practices

For a start, application code, developed either by in-house designers or third-party vendors, should follow the embedded security policies to ensure that only approved firmware is used. And that the application code is signed and verified before execution.

Security MCUs

Embedded designers develop a secure bootloader and application code to ensure that the application is signed and verified before the execution. However, a connected design’s identity, signed certificates, and security keys are not protected in common MCUs.

Figure 3: Here is a step-by-step view (bottom) of how a security MCU validates the authenticity and integrity of an embedded design before code execution to ensure that invalid and malicious code cannot be run. Image: Microchip

A secure MCU (Figure 3) with the hardware root of trust features an isolated security enclave for key storage, and that facilitates authentication to safeguard the secure boot operations. It ensures that a system-critical command is from a known source, and it has the authorization to make the given change.

Boot speed

The security-centric MCUs, offering hardware cryptographic cipher suites, also reduce the compute overhead compared to software-based solutions. They can run secure boot quickly and at lower cost and power consumption as compared to software solutions. The software-based solutions running hash algorithms are usually more time-consuming.

Firmware updates

The combination of secure boot and secure firmware updates adds a new dimension to the security feature set of MCUs. An MCU equipped with a security feature set can also verify that the firmware update hasn’t been corrupted and that it comes from a trusted source.

Additionally, it creates multiple layers of security in embedded designs and thus lowers the risk of security breaches. It’s worth mentioning here that some secure boot mechanisms, such as the ones that lock flash memory or use one-time programmable (OTP) memory, can also close the door for engineering updates in the future.

 

You may also like:

  • RISC V
    RISC-V for ultra-low power processing and AI on the edge
  • RISC-V
    Growing availability of tools reducing risk of using RISC-V
  • RiSC-V
    RISC-V is growing and offers stability, scalability and security
  • Embedded security
    Embedded security: Do you know what you don’t know?
  • IoT security
    How to tackle the tough stuff around IoT security –…

Filed Under: Applications, FAQ, Featured, IoT Tagged With: FAQ

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Can chiplets save the semiconductor supply chain?

Navigating the EU Cyber Resilience Act: a manufacturer’s perspective

The intelligent Edge: powering next-gen Edge AI applications

Engineering harmony: solving the multiprotocol puzzle in IoT device design

What’s slowing down Edge AI? It’s not compute, it’s data movement

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Test & Measurement
We’ve gathered articles that include hands-on product tryouts and reviews. Indeed, every article in this issue uses an oscilloscope in one way or another so you might just call this “The Oscilloscope Tech Toolbox.”

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy