Security is the protection of assets, both physical and logical from unauthorized access, theft or damage. In an increasingly uncertain world, the growing concern for security, safety and privacy has paved the way for intelligent security solutions that incorporate cutting edge technologies like fingerprint biometrics, cryptography, and video analytics along with many other new techniques.
Kevin Ashton, cofounder and executive director of the Auto-ID Center at MIT, first mentioned the Internet of Things in a presentation he made to Procter & Gamble. Here’s how Ashton explains the potential of the Internet of Things:“Today computers — and, therefore, the Internet — are almost wholly dependent on human beings for information. Nearly all of the roughly 50 petabytes (a petabyte is 1,024 terabytes) of data available on the Internet were first captured and created by human beings by typing, pressing a record button, taking a digital picture or scanning a bar code.
The problem is, people have limited time, attention and accuracy — all of which means they are not very good at capturing data about things in the real world. If we had computers that knew everything there was to know about things — using data they gathered without any help from us — we would be able to track and count everything and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling and whether they were fresh or past their best.”
As every player with a stake in IoT is well aware, security is paramount for the safe and reliable operation of IoT connected devices. It is, in fact, the foundational enabler of IoT.
Although it has been with us in some form and under different names for many years, the Internet of Things (IoT) is suddenly the thing. The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement.
In IoT, security for software side is done by many protocols and encrypted by so many methods but when we look at the hardware side there is some big question arises whether any method is evolving to make hardware side to secure but the answer is there is no proven security to make hardware side looking secure.
Tenet Technetronics has introduced solution to make hardware side of the IoT to secure by using Tenet Security IC breakout where DS28 is heart of the breakout, This breakout comes with the electronics registration number to provide an absolutely unique identity that can be determined by I2C and SM bus interface. The registration number is factory-lasered ,64 bit ROM that include unique 48 bit serial number, an 8 bit CRC and an 8 bit family code(70h).
By using this breakout we are able to secure the IoT hardware things since it comes with unique identity which cannot be reproduced and it cannot be duplicated since it is factory lasered IC which cannot be replicated or reproduced.
Download application note here : http://www.tenettech.com/product/7363/app-notesecurity-ic-breakouttenet-security-ic-breakoutapplication-note-tenet-security-ic-breakout
Download Arduino library :http://www.tenettech.com/product/7361/tenetsecurity-ictenet-security-ic-breakoutiot-securitysecure-iottt-sp-009 ( click Sample download)
For product link : http://www.tenettech.com/product/7361/tenetsecurity-ictenet-security-ic-breakoutiot-securitysecure-iottt-sp-009
For more information please visit : www.tenettech.com
For technical query please send us email : info@tenettech.com