• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

The security of connected devices

February 24, 2017 By Scott Thornton 1 Comment

Take an MCU and add Bluetooth or Wi-Fi connection to the internet and you have an Internet of Things (IoT) device, and smart devices that are connected to the internet are everywhere. Smartphones, home automation, fitness bands, and products like the Amazon Echo are all examples of IoT. The problem with millions of internet-connected MCUs is that they can be hacked. A Distributed Denial of Service (DDoS) attack is when hundreds, thousands, or even millions of independent IoT devices are hacked and instructed to ping or query a single server or collection of servers belonging to a single entity within the same time frame. The receiving server cannot answer legitimate traffic because it’s busy investigating every knock on the door. In essence, DDoS is internet censorship at the least and the shutdown of vital services at its worst.

Source: Infographic: Internet of Things Top 10, https://www.owasp.org

It’s up to manufacturers, designers, and developers of IoT devices to make them resistant to hacking by providing security. Many IoT devices in current operation, including connected automotive devices, have no security in place (not even a password.) Devices can be in operation for years and continue to operate normally even when they have been compromised. A CCTV camera that records license plate data to a database in a cloud via a wireless internet connection could be sending spam in between snapshots and uploads. Essentially, the connected MCU becomes a bot on the net and may or may not operate as intended, once hacked.

Source: Infographic: Internet of Things Top 10, https://www.owasp.org

What can you do? Choose to apply a difficult-to-guess password (the longer the better and use symbols if possible.) Brute force hacking is a common tactic as a hacker’s computer program tries to guess passwords based on words in the dictionary. A computer that is set up to brute force hack at high speeds can crack a simple password by trying every word in the dictionary. Another tool in the anti-hacking toolbox is secure boot. Secure boot makes sure that an MCU is designed to run only secure software. Firmware updates ae signed with a key that requires authentication by the MCU chip, so the MCU knows whether that firmware is safe to run. The code can be intercepted and examined, but it cannot be run on the MCU without authentication. Code can also be encrypted so that it cannot be examined. However, the code must be decrypted by the processor before running it.

Make sure your connected device has firmware that can be updated. Security has to start from the ground up, since adding security to an existing design is much more difficult to implement. Security is also an ongoing operation; firmware updates may be necessary later as new hacks are discovered. The new rule of thumb is to update the firmware of any internet connected device as soon as it comes out of the box.

What kinds of attacks are possible to contaminate internet connected MCUs? Physical hardware access is one way to compromise your device. Internet access isn’t always necessary, since an attack could be local to your network or as simple as inserting a contaminated SD card. Another type of attack is termed “Man in the Middle,” or MITM attack. A MITM attack occurs when anything in between your device and the server it’s trying to communicate with is the attack vector. The attack could also come from the server (cloud) that your internet-connected MCU is doing business with or uploading data to, which means that security on the server-side is also imperative. Therefore, simple web security practices are necessary.

Source: Infographic: Internet of Things Top 10, https://www.owasp.org

If you are creating a personal, one-off project, simple password and secure boot may be enough. But if you plan to deploy many, or sell an IoT product, don’t store anything on external memory that isn’t encrypted and disable debug interfaces before you deploy devices to the field. Debug interfaces like JTAG leave your device open to physical hacking.

As a consumer of electronics products, you can mitigate being an IoT hack server by staying current; get on a mailing list, register your product, buy only from reputable manufacturers, and generally follow security news regarding your electronics. The Open Web Application Security Project (OWASP) is “…an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.” The OWASP IoT Project is an effort to make it easier for everyone to understand the security issues regarding the IoT and to enable users to make better decisions regarding IoT. Material from the OWASP IoT Project is free to use and distribute.

 

 

You may also like:


  • Security for embedded systems – Virtual Roundtable (part 1 of…
  • Embedded systems software and programming
    Embedded systems software and programming for a safer world

  • Securing embedded systems in a hostile world

Filed Under: Applications, FAQ, Featured, Industry Experts, IoT, Security Tagged With: basics, FAQ, owasp.org

Reader Interactions

Comments

  1. Bobby Saint says

    December 4, 2017 at 6:53 pm

    I totally agree with what you mentioned about choosing a password that is difficult to guess as one way to protect and secure your devices. It’s recommended that you use a password that has a combination of alpha-numeric characters. This would surely help prevent your password from getting hacked. I would always keep this in mind. Thanks.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Can chiplets save the semiconductor supply chain?

Navigating the EU Cyber Resilience Act: a manufacturer’s perspective

The intelligent Edge: powering next-gen Edge AI applications

Engineering harmony: solving the multiprotocol puzzle in IoT device design

What’s slowing down Edge AI? It’s not compute, it’s data movement

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Connectivity
AI and high-performance computing demand interconnects that can handle massive data throughput without bottlenecks. This Tech Toolbox explores the connector technologies enabling ML systems, from high-speed board-to-board and PCIe interfaces to in-package optical interconnects and twin-axial assemblies.

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2026 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy