Tag Archives: Industrial IoT

Secured SAMA5D4 for industrial, fitness or IoT display


To target applications like home automation, surveillance camera, control panels for security, or industrial and residential gateways, high DMIPS computing is not enough.


The new SAMA5D4 expands the Atmel | SMART Cortex-A5-based family, adding a 720p resolution hardware video decoder to target Human Machine Interface (HMI), control panel and IoT applications when high performance display capability is required. Cortex-A5 offers raw performance of 945 DMIPS (@ 600 MHz) completed by ARM NEON 128-bit SIMD (single instruction, multiple data) DSP architecture extension. To target applications like home automation, surveillance camera, control panels for security, or industrial and residential gateways, high DMIPS computing is not enough. In order to really make a difference, on top of the hardware’s dedicated video decoder (H264, VP8, MPEG4), you need the most complete set of security features.

Life-Fitness-F3-Folding-Treadmill-with-GO-Console-2_681x800

Whether for home automation purpose or industrial HMI, you want your system to be safeguarded from hackers, and protect your investment against counterfeiting. You have the option to select 16-b DDR2 interface, or 32-b if you need better performance, but security is no longer just an option. Designing with Atmel | SMART SAMA5D4 will guarantee secure boot, including ARM Trust Zone, encrypted DDR bus, tamper detection pins and secure data storage. This MPU also integrates hardware encryption engines supporting AES (Advanced Encryption Standard)/3DES (Triple Data Encryption Standard), RSA (Rivest-Shamir-Adleman), ECC (Elliptic Curves Cryptography), as well as SHA (Secure Hash Algorithm) and TRNG (True Random Number Generator).

If you design fitness equipment, such as treadmills and exercise machines, you may be more sensitive to connectivity and user interface functions than to security elements — even if it’s important to feel safe in respect with counterfeiting. Connectivity includes gigabit and 10/100 Ethernet and up to two High-Speed USB ports (configurable as two hosts or one host and one device port) and one High Speed Inter-Chip Interface (HSIC) port, several SDIO/SD/MMC, dual CAN, etc. Because the SAMA5D4 is intended to support industrial, consumer or IoT applications requiring efficient display capabilities, it integrates LCD controllers with a graphics accelerator, resistive touchscreen controller, camera interface and the aforementioned 720p 30fps video decoder.

hmi-panels-sama5d4-atmel-processor

The MCU market is highly competitive, especially when you consider that most of the products are developed around the same ARM-based family of cores (from the Cortex-M to Cortex-A5 series). Performance is an important differentiation factor, and the SAMA5D4 is the highest performing MPUs in the Atmel ARM Cortex-A5 based MPU family, offering up to 945 DMIPS (@ 600 MHz) completed by DSP extension ARM NEON 128-bit SIMD (single instruction, multiple data). Using safety and security on top of performance to augment differentiation is certainly an efficient architecture choice. As you can see in the block diagram below, the part features the ARM TrustZone system-wide approach to security, completed by advanced security features to protect the application software from counterfeiting, like encrypted DDR bus, tamper detection pins and secure data storage. But that’s not enough. Fortunately, this microprocessor integrates hardware encryption engines supporting AES/3DES, RSA, ECC, as well as SHA and TRNG.

The SAMA5 series targets industrial or fitness applications where safety is a key differentiating factor. If security helps protecting the software asset and makes the system robust against hacking, safety directly protects the user. The user can be the woman on the treadmill, or the various machines connected to the display that SAMA5 MCU pilots. This series is equipped with functions that ease the implementation of safety standards like IEC61508, including a main crystal oscillator clock with failure detector, POR (power-on reset), independent watchdog timers, write protection register, etc.

Atmel-SMART-SAMA5D4-ARM-Cortex-MPU-AtmelThe SAMA5D4 is a medium-heavier processor and well suited for IoT, control panels, HMI, and the like, differentiating from other Atmel MCUs by the means of performance and security (not to mention, safety). The ARM Cortex-A5 based device delivers up to 945 DMIPS when running at 600 MHz, completed by DSP architecture extension ARM NEON 128-bit SIMD. The most important factor that sets the SAMA5D4 apart from the rest is probably its implemented security capabilities. These will protect OEM software investments from counterfeiting, user privacy against hacking, and its safety features make the SAMA5D4 ideal for industrial, fitness or IoT applications.


This post has been republished with permission from SemiWiki.com, where Eric Esteve is a principle blogger as well as one of the four founding members of the site. This blog first appeared on SemiWiki on October 6, 2015.

Report: Over 20 percent of enterprises will invest in IoT security by 2017

Over 20% of enterprises will have digital security services for business initiatives using Internet of Things (IoT) devices by 2017, new research from Gartner has revealed.

internetofthingsvisualized

The research firm has announced that over the next three or so years, approximately one in five enterprises will recognize the necessity to protect business units which use IoT devices, and as a result, will be required to invest more heavily in security.

“The power of an Internet of Things device to change the state of environments and of itselfwill cause chief information security officers (CISOs) to redefine the scope of their security efforts beyond present responsibilities,” said Earl Perkins, Research Vice President at Gartner. “IoT security needs will be driven by specific business use cases that are resistant to categorization, compelling CISOs to prioritize initial implementations of IoT scenarios by tactical risk. The requirements for securing the IoT will be complex, forcing CISOs to use a blend of approaches from mobile and cloud architectures, combined with industrial control, automation and physical security.”

The research firm says that excluding PCs, tablets and smartphones, IoT devices will grow to 26 billion units by 2020, which is almost 30 times higher than an estimated 0.9 billion units in 2009. In addition, ‘ghost’ devices — IoT appliances with unused connectivity potential — will be common.

The IoT industry is expected to contribute $1.9 trillion to the global economy by 2020, with manufacturing, health, insurance and the financial sector benefiting most in the beginning before IoT expands across other industry sectors. In addition, there will be a $309 billion incremental revenue opportunity in 2020 for IoT suppliers from delivering products and services.

“In an IoT world, information is the ‘fuel’ that is used to change the physical state of environments through devices that are not general-purpose computers but, instead, devices and services that are designed for specific purposes. The IoT is a conspicuous inflection point for IT security — and the CISO will be on the front lines of its emerging and complex governance and management,” Perkins adds.

(Source: ZDNet)

(Source: ZDNet)

Perkins says that the “Nexus of Forces” identified in the recently-released report include cloud, social, mobile and information, each of which are driving early opportunities in IoT — some of which we have already seen ranging from wearable technology to smart home appliances and meters. The IoT already has a myriad of commercial and consumer technology use cases that range from connected homes and connected automobiles to wearable devices, from intelligent medical equipment to sensor systems for smart cities and facilities management.

The characteristics of intelligent, purpose-built devices that are networked to provide information and state changes for themselves or surrounding environments are increasingly used in OT systems, such as those found in industrial control and automation (sometimes referred to as the “Industrial IoT” or the “Industrial Internet.”). However, securing the IoT represents new CISO challenges in terms of the type, scale and complexity of the technologies and services that are required.

“At this time, there is no ‘guide to securing IoT’ available that provides CISOs with a framework for incorporating IoT principles across all industries and use cases. What constitutes an IoT device is still up for interpretation, so securing the IoT is a ‘moving target.’ However, it is possible for CISOs to establish an interim planning strategy, one that takes advantage of the ‘bottom up’ approach available today for securing the IoT,” Perkins noted.

Gartner advises security leaders against over thinking IoT security by attempting to draft a grand strategy that encompasses all IoT security needs to this point in time. Instead, they should lower the residual risk of the IoT by assessing whether the particular business use case provides better control and performance. Lessons from these initial use cases will serve as building blocks for a broader strategy for addressing the security of the IoT.”

So, what’s the first step in securing our intelligent, connected world? As previously discussed on Bits & Pieces, the dirty little secret of the IoT is that there probably cannot be such a thing as the Internet of Things if those things are not secure. That is where devices like Atmel CryptoAuthentication ICs play an important, if not catalytic role.

Analyst Patrick Moorhead talks IoT

The rapidly evolving Internet of Things (IoT) is clearly an idea whose time has finally come. Indeed, falling technology costs, developments in complementary fields like mobile and cloud, together with support from governments have all contributed to the dawning of an IoT “quiet revolution.”

In fact, over three-quarters of companies are now actively exploring or using the IoT, with the vast majority of business leaders believing it will have a meaningful impact on how their companies conduct business. In a recent report sponsored by ARM, Clint Witchalls confirms that consumers will likely soon be awash with IoT-based products and services – even if they may not realize it.

Commenting on the Witchalls report in Forbes, analyst Patrick Moorhead notes that business leaders seem to be highly optimistic about the IoT and its ability to transform their business, either by driving new sources of revenue or by making operations more efficient.

“This is a good sign that leaders think they can make more money and save more money. It isn’t often that you can find both of these together,” he explains. “The [Witchall report] also shows that most companies are investing in IoT right now, but most are just researching what they can do with it versus planning, piloting, or implementing projects.”

So how far are we along the continuum from early adoption to mass adoption?

Well, 95% of those surveyed in the above-mentioned ARM report say they believe their companies will be using IoT in three years.

“While most in surveys are optimistic, this is a huge number when you think of it, even if, in reality, it’s four to five years,” Moorhead notes. “While I think 95% is overly-aggressive, this would be as pervasive as a smartphone or a personal computer use.”

Interestingly, Moorhead splits the concept of IoT into two distinct segments: the Industrial IoT (IIoT) and the Human (HIoT).

“The IIoT brings autonomous monitoring and operations capability to factory boilers, HVAC systems, and hospital medical systems,” he says. “IIoT systems are very high availability and companies like General Electric GE  and Echelon ELON play in this space. The HIoT comprise of more interactive, consumer-based devices like a FitBit, Revolv Hub and a Nest Thermostat. ARM, the study sponsor, obviously plays heavily in both the IIoT and the HIoT.”

Interested in learning more? The full text of the Forbes article can be read here, while the ARM-sponsored Witchalls report is available here.