(Source: ArtemisDiana / stock.adobe.com)
It’s evident that networked embedded systems need robust security measures, but most embedded engineers are not security experts. To protect against a wide range of threats, they need guidance on the nature of these threats and a multi-layer defense strategy that stretches from securing hardware design to implementing encryption protocols.
This need has led to a decentralized security framework based on zero-trust principles and emphasizing the CIA triad—confidentiality, integrity, and availability.
In most cases, organizations lack a comprehensive understanding of the full scope of edge device deployments. The Internet of Things (IoT) places many devices beyond traditional security perimeters, where they are inherently vulnerable. Devices are often situated in remote locations, making effective management and security difficult, and IT departments typically have limited oversight of edge devices, so monitoring becomes a challenge.
Furthermore, embedded device design teams often have limited testing resources, so vulnerabilities may go unnoticed. This risk is particularly high for the many designs that rely on third-party libraries and frameworks. Flaws in these components tend to be well-known and frequently exploited, especially for open-source solutions.
Similarly, failure to keep firmware up to date can leave devices vulnerable to exploitation. There is a dilemma here as firmware often receives less attention than software—but at the same time, holes in firmware can become entry points for unauthorized access and malicious code execution.
Unfortunately, even the most updated systems can be easily compromised if authentication and authorization mechanisms are weak. Flaws like poor credential and session management can leave devices vulnerable to brute-force password guessing and session hijacking attacks. Similarly, poorly designed APIs can be easy entry points for denial-of-service (DoS) and other attacks.
Finally, limited computational resources on edge devices restrict the scope of potential defenses and make them vulnerable to overload attacks. This risk highlights the importance of ensuring that edge devices have adequate resources to handle spikes in demand and are resilient against resource exhaustion attacks.
To combat these threats, the CIA triad outlines three principles:
Integrity data and operations. TPMs, for example, play a key role in ensuring data and operations remain unchanged and trustworthy by verifying the authenticity of firmware and software using digital signatures. This enables secure boot and guards against malware injections. Additionally, TPMs can be used to detect tampering by monitoring changes in hardware components, contributing to a more robust security posture. Additionally, an intrusion detection system (IDS) can help guard against the manipulation of data or functionality, but the demands of an IDS exceed the capabilities of a typical edge device. As a result, IDS is usually implemented at the network level.
Of course, not all threats occur in the digital domain. The physical design of edge devices must also keep security in mind. In addition, backup systems and recovery plans should be in place for rapid restoration in case a system is compromised.
Implementing measures that meet these goals requires carefully balancing security, resource limitations, and operational needs. Engineers can adopt proven security methodologies tailored for embedded systems to meet this challenge. These include:
These approaches align well with the CIA triad design principles, providing engineers with effective tools to enhance the security of their edge devices. By adopting this framework, designers can minimize the risk to their systems and protect entire infrastructures from attack.
Brandon Lewis has been a deep tech journalist, storyteller, and technical writer for more than a decade, covering software startups, semiconductor giants, and everything in between. His focus areas include embedded processors, hardware, software, and tools as they relate to electronic system integration, IoT/industry 4.0 deployments, and edge AI use cases. He is also an accomplished podcaster, YouTuber, event moderator, and conference presenter, and has held roles as editor-in-chief and technology editor at various electronics engineering trade publications. When not inspiring large B2B tech audiences to action, Brandon coaches Phoenix-area sports franchises through the TV.