Electronica Azi International no. 1 - 2019

Page 17

INSIGHT » IoT

This can be done very easily using a compiler/ IDE like Keil MDK. What a developer essentially ends up with is a multi-project workspace where one project is the secure code and the other is the non-secure code (figure 5). When a TrustZone application starts, the code begins executing in the secure state.

This allows a developer to immediately establish a root of trust from which the rest of the application can execute. Once the system boots, the application will switch from the secure state to the non-secure and execute what is known as the user code. At this point, the application executes just like any other embedded application. The main

Figure 6: A TrustZone application starts execution from the secure state and enters the non-secure state once the root of trust has been established. The non-secure state can only make function calls to exposed functions within the secure code, otherwise an exception is thrown. (Image source: Keil)

difference is that the non-secure code can only access secure functions and callbacks through a secure gateway (figure 6). If the user application attempts to access secure code, memory or peripherals without going through the secure gateway, an exception will be generated. Undoubtedly this means that either there is a bug in the software, or in a production environment, a hacker is attempting to access the system. At this point, the code can then decide how it should thwart the attack, such as restarting the system to remove any injected code that may be running in the non-secure SRAM. CONCLUSION Securing a microcontroller-based application for the IoT is important but tricky. Security starts at the hardware level, but many traditional microcontroller families running Cortex-M0+, Cortex-M3/4/7 cores may lack the features necessary to successfully secure the device. Developers can now leverage the new Armv8-M architecture on the Cortex-M23 and Cortex-M33 cores to secure their embedded applications using a rising number of processors using the architecture. www.digikey.com

PRODUCT NEWS

Arduino unveils the Arduino IoT Cloud Arduino, the world’s leading open-source hardware and software platform, today announced the introduction of an IoT Cloud as part of its professional IoT strategy. Targeted at developers, system integrators and maker hobbyists, the Arduino IoT Cloud is an easy-to-use Internet of Things application platform that enables users to develop and manage IoT applications that solve reallife problems in a business environment or in everyday life. The introduction of this new platform builds on Arduino’s mission of making complex technology simple enough for anyone to use.

Convenience and flexibility were key considerations for the Arduino IoT Cloud. A major benefit is its ability to program Arduino boards, whereas previously users were required to program them via Arduino Sketch. The Arduino IoT Cloud will quickly and automatically generate a sketch when setting up a new thing, thus enabling a developer to achieve a working device within five minutes of unboxing a board. The Arduino IoT Cloud also allows other methods of interaction, including HTTP REST API, MQTT, command-line tools, JavaScript, and WebSockets.

Designed for seamless IoT development the MKR form factor delivers embedded connectivity and very low power consumption in a compact size.

These features make the boards the most suitable solution for emerging battery-powered IoT edge applications, such as environmental monitoring, tracking, agriculture, energy monitoring, and industrial automation. Arduino | www.arduino.cc www.international.electronica-azi.ro

17


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.