Tag Archives: microcontroller

KeKePad is an ATmega32U4-powered wearables platform


KeKePad is a plug-and-play platform that replaces conductive thread with tiny connectors and thin cables.


Like most Makers, Michael Yang enjoyed using the Arduino Lilypad for his wearable and e-textile projects. However, he discovered that conductive thread has a few drawbacks: it is expensive, it has no insulation and its resistance is quite high. Plus, in order to achieve a tight connection, the wires need to be soldered (which means that it becomes rather difficult to remove if there are any mistakes).

hao7bdiecunyned9pw7h

So, as any DIY spirited individual would do, he set out to solve this problem. The result? KeKePad, a new modular platform that’s 100% compatible with the Arduino LilyPad USB and can be programmed using the Arduino IDE. The board is based on the ATmega32U4 — the same chip that can be found at the heart of the wildly popular Adafruit FLORA — and features built-in USB support, so it can be easily connected to a PC. Like other wearable MCUs, the controller boasts a familiar round shape (which measures 50mm in diameter) along with 12 tiny three-pin Ke Connectors and 11 sew tab pins.

KeKePad-introduction-1024

What really sets the platform apart, though, is its unique wiring and connection method. The KeKePad entails a series of small sewable modules that link together via the Ke Connectors and special cables, or Ke Cables, with crimp terminals. This eliminates the frustration often associated with using conductive thread. With a diameter of only 0.32mm, the wire is extremely flexible, super thin and coated in Teflon.

eitufc.jpg

At the moment, there are approximately 20 different modules to choose from, including sensors for detecting light, UV, sound, barometric pressure, temperature, humidity, and acceleration, as well as actuator modules for things such as LEDs, MP3s, OLED displays and vibrating buzzers.

Intrigued? Head over to KeKePad’s Indiegogo campaign, where Yang and his team are currently seeking $2,000. Delivery is slated for April 2016.

Rewind: 50 boards you’ll want to know about from 2015


Here’s a look at a bunch of boards that caught our attention over the last 12 months. Feel free to share your favorites below! 


“Hardware becomes a piece of culture that anyone can build upon, like a poem or a song.” – Massimo Banzi

Arduino Zero

ZERO_front_1024x1024

A 32-bit Arduino powered by the Atmel | SMART SAM D21.

Arduino Wi-Fi Shield 101

ASX00001_featured_1024x1024

An IoT shield with CryptoAuthentication that enables you to wirelessly connect your Arduino or Genuino with ease.

Arduino MKR1000

Chip

A powerful board that combines the functionality of the Zero and the connectivity of the Wi-Fi Shield.

Atmel | SMART SAM L21

SAM_L21_XPRO_Angle2-1

A game-changing family of Cortex-M0+ MCUs that deliver power consumption down to 35 µA/MHz in active mode and 200nA in sleep mode.

BTLC1000

BTL

An ultra-low power Bluetooth Smart SoC with an integrated ARM Cortex-M0 MCU and transceiver.

Atmel | SMART SAMA5D2

ult

An ARM Cortex-A5-based MPU that offers great features integrated into lower pin count packages, making it ideal for applications where security, power consumption and space constraints are key considerations.

Atmel | SMART SAM S70/E70

SAM

An ARM Cortex-M7-based MCU with a floating point unit (FPU) that’s ideal for connectivity and general purpose industrial applications.

ATmegaS128

ATme

A space-ready version of the popular ATmega128.

Adafruit Feather

NewImage376.png

A new line of development boards that, like it’s namesake, are thin, light and let your ideas fly. Expect Feather to become a new standard for portable MCU cores.

Adafruit METRO 328

2466-04

An ATmega328-driven processor packed with plenty of GPIO, analog inputs, UART, SPI and I2C, timers, and PWM galore – just enough for most simple projects.

Arduino GEMMA

abx00001_featured_1024x1024

A miniature wearable board based on the ATtiny85.

Adafruit Bluefruit LE Micro

2661-00

A board that rolls the versatility of the ATmega32U4 and the wireless connectivity of the SPI Bluefruit LE Friend all into one.

SparkFun Stepoko

Stepoko_Tutorial-21_red

An Arduino-compatible, 3-axis control solution that runs grbl software.

SparkFun SAM D21 Breakout

SAM

An Arduino-sized breakout for the ATSAMD21G18.

Bosch Sensortec BMF055

bmf055_440

A compact 9-axis motion sensor, which incorporates an accelerometer, a gyroscope and a magnetometer along with an Atmel | SMART SAM D20 ARM Cortex M0+ core.

BNO055 Xplained Pro

NO

A new extension board, which features a BNO055 intelligent 9-axis absolute orientation sensor, that connects directly to Atmel’s Xplained board making it ideal for prototyping projects for IoT apps.

SmartEverything

Board_SM_586_grayok

A prototyping platform that combines SIGFOX, BLE, NFC, GPS and a suite of sensors. Essentially, it’s the Swiss Army knife for the IoT.

Qduino Mini

MCU

A tiny, Arduino-compatible board with a built-in battery connector and charger built-in, as well as a fuel gauge.

Tessel 2

tessel2-800x600

A dev board with a SAM D21 coprocessor, reliable Wi-Fi, an Ethernet jack, two USB ports and a system that runs real Node.js/io.js.

LattePanda

LattePanda

A Windows 10 single-board computer equipped with an Intel Atom x5-Z8300 Cherry Trail processor, 2GB of RAM, 32GB of storage and an ATmega32U4 coprocessor.

LightBlue Bean+

cortado-quarter-1280x960_1024x1024

An Arduino-compatible board that is programmed wirelessly using Bluetooth Low Energy.

Makey Makey GO

photo-original

A thumbdrive-shaped device that can transform ordinary objects into touch pads.

Hak8or

DSC_9624_S

An uber mini, DIY board based on an Atmel | SMART AT91SAM9N12 that runs Linux via a USB drive.

Modulo

spark-modulo

A set of tiny modular circuit boards that takes the hassle out of building electronics.

Microduino mCookie

promo-shot-mcookie

A collection of small, magnetically stackable modules that can bring your LEGO projects to life.

The AirBoard

airboard

A compact, open source, wireless and power efficient dev board designed to learn, sketch and deploy prototypes out in the field.

Autonomo

sodaq

A matchbox-sized, Arduino-compatible MCU powered by a small solar panel.

Helium

sensor_with_hand-1940x1455

An integrated platform that brings the power of the cloud to the edge of the network, enabling you to observe, learn and capture actionable insights from existing physical ‘things’ in your environment.

Sense HAT

astropi-Pi

An add-on for the Raspberry Pi equipped with a gyroscope, an accelerometer, a magnetometer, a temperature sensor, a barometric pressure sensor and a humidity sensor, as well as a five-button joystick and an 8×8 RGB LED matrix — all powered by an LED driver chip and an ATtiny88 running custom firmware.

Ardhat

6a406bc3c11fed4a8387966dd8473198_original

A HAT with an Arduino-compatible processor that responds quickly to real-time events, while letting the Raspberry Pi do all of the heavy lifting.

Wino

Bild

A cost-effective, Arduino-compatible board with built-in Wi-Fi.

pico-Platinchen

pico1

A little board designed for wearable devices that features a BNO055, an ATmega328P and a CR2032 coin-cell battery.

 XeThru X2M200 and X2M300

Xen.png

A pair of adaptive smart sensor modules that can monitor human presence, respiration and other vital information.

LinkIt Smart 7688 Duo

8c9810bd7307c22742a0ccdfbc908a17-image-530x397

An Arduino Yún-friendly platform powered by an ATmega32U4 and MediaTek MT7688 SoC.

Piccolino

photo-original2

A small, inexpensive controller with an embedded OLED display and Wi-Fi connectivity that you can program using existing tools like the Arduino IDE.

ZeroPi

8593e8974dbbe70ee4ee826a8ef292b4_original

A next-generation, Arduino and Raspberry Pi-compatible dev kit for robotic motion structure systems and 3D printers that boasts an Atmel | SMART SAM D21 at its core.

CryptoShield

CryptoShield_6

A dedicated security peripheral for the Arduino and was made in collaboration with SparkFun’s previous hacker-in-residence, Josh Datko. This shield adds specialized ICs that perform various cryptographic operations which will allow you to add a hardware security layer to your Arduino project.

ZYMKEY

df64307484309c0ef944b7a5512b2832_original-1

An add-on board that makes it easy to secure your Raspberry Pi and Linux applications.

Flip & Click

arduino-side-spacers

A two-sided, Arduino-like board with an AT91SAM3X8E for its heart.

ChipWhisperer-Lite

P1080764__64385.1444013016.1000.1200

An open source toolchain for embedded hardware security research including side-channel power analysis and glitching. The board uses a Spartan 6 LX9, along with a 105 MS/s ADC, low-noise amplifier, an Atmel | SMART SAM3U chip for high-speed USB communication, MOSFETs for glitch generation and an XMEGA128 as a target device.

KeyDuino

photo-original

An Arduino Leonardo-like board with built-in NFC that lets you replace your keys with any smartphone, NFC ring or proximity card.

Neutrino

2d67550a42b543732458e2bb36d2ce23_original

An inexpensive, open source and shrunken-down version of the Arduino Zero that boasts a 32-bit ATSAMD21G18 running at 48MHz and packing 32K of RAM.

WIOT

2015-03-30T02-12-57.577Z-WIOT_4.png.855x570_q85_pad_rcrop

An open source, Arduino-compatible board with an ATmega32U4, ESP8266 Wi-Fi module and lithium-ion battery support.

Obscura

photo-original-1

An ATmega32U4-powered, 8-bit synthesizer that enables you to create NES, C64 and Amiga-style chiptune music by simply connecting a MIDI device.

Zodiac FX

photo-original

An OpenFlow switch that is powerful enough to develop world-changing SDN apps yet small enough to sit on your desk. Based on an Atmel | SMART SAM4E, the unit includes four 10/100 Fast Ethernet ports with integrated magnetics and indicator LEDs along with a command line interface accessible via USB virtual serial port.

Goldilocks Analogue

photo-original-2

A board that brings sophisticated analog and audio input, output and storage capabilities to the Arduino environment.

NodeIT

ar

A super small and expandable IoT system for Makers.

Pixel

17e3121f47a1659b1ece2240bcd6916d_original

A smart display that features an Atmel | SMART SAM D21 MCU operating at 48MHz and packing 32K of RAM, along with a 1.5” 128×128 pixel OLED screen and a microSD slot.

SDuino

9864981437569005598

An Arduino crammed inside an SD card.

… and how could we not mention this?

The WTFDuino!

wtfduino_banana_arduino_by_calum_knott_1-620x465

Do you feel like today’s MCUs are too simple and sensible? Well, one Maker decided to take a different approach by “undesigning” the Arduino into a banana-shaped processor whose form factor is impossible to breadboard and whose pins are incorrectly labelled.

 

UC San Diego engineers develop a smart mouth guard


Researchers have developed an integrated wireless mouth guard biosensor for real-time monitoring of health markers in saliva.


Engineers at the UC San Diego have developed a smart mouth guard capable of monitoring health markers, such as lactate, cortisol and uric acid, in saliva and transmitting the data wirelessly to a mobile device. The idea is that, one day, the technology could be used to keep tabs on patients without invasive procedures, as well as track athletes’ performance or stress levels in soldiers and pilots.

CNvZzu_XAAADqzN

The study, which was led by UC San Diego professors Joseph Wang and Patrick Mercier, focused primarily on uric acid, which is a marker related to diabetes and gout. Currently, the only way to monitor these levels in a patient are through blood tests. Wang explains, “The ability to monitor continuously and non-invasively saliva biomarkers holds considerable promise for many biomedical and fitness applications.”

The team of researchers developed a screen-printed sensor using silver, Prussian blue ink and uricase. To ensure that the sensors only reacted with the uric acid, the nanoengineers had to set up the chemical equivalent of a two-step authentication system. The first step involves a series of chemical keyholes that allows only the smallest biochemicals to enter inside the sensor. The second step is a layer of uricase trapped in polymers. The reaction between acid and enzyme generates hydrogen peroxide, which is detected by the Prussian blue ink.

That information is then sent to a circuit board as electrical signals via metallic strips that are part of the sensor. The board, which is no much bigger than a penny, is equipped with a microcontroller, a Bluetooth Low Energy transceiver, and a potentiostat. These small chips detect the sensor output, digitizes it and wirelessly relays the data over to a smartphone or computer.

Thus far, the researchers have been able to show that the mouth guard sensor could offer an easy, more reliable way to monitor uric acid levels; however, it has only been tested with human saliva and not yet actually in a person’s mouth. Looking ahead, the team plans to embed all of the electronics inside the wearable device so that it can be worn. This process will entail testing the various sensors and electronic materials to ensure their biocompatibility.

The next iteration of the mouth guard is expected to be completed in a year or so. Until then, you can read all about the study in its recently published article in Biosensors and Bioelectronics.

(Image: UC San Diego, Jacobs School of Engineering)

Bluefruit LE Micro is a BLE board for Makers


Bluetooth Low Energy + ATmega32U4 = Bluefruit LE Micro 


Makers who are looking to create a Bluetooth-enabled project will be excited to learn of Adafruit’s latest product. The newly-unveiled Bluefruit LE Micro rolls the versatility of the ATmega32U4 MCU and the wireless connectivity of the SPI Bluefruit LE Friend all into one board.

INewImage27

What’s nice is that the Bluefruit LE Micro makes is easier than ever to add BLE capabilities to any number of DIY projects. Makers can program the ATmega32U4 over USB using its built-in USB bootloader, either directly with AVRDUDE or the Arduino IDE. The board runs at a 8MHz clock speed, boasts a logic level of 3.3V for compatibility with a wide range of sensors, and features more than 20 GPIO pins, including I2C, SPI, a UART and six analog inputs. On top of that, the chip packs 28KB of Flash, 2KB of RAM, and of course, native USB for programming and communication.

As Adafruit points out, Makers can add a rechargeable LiPo battery with the help of a LiPoly backpack as well. Simply solder it on top of the Bluefruit LE Micro and it’ll juice up the battery via the microUSB connector. When the USB is unplugged, it will run off the battery.

“The Bluefruit LE module is an nRF51822 chipset from Nordic, programmed with multi-function code that can do quite a lot! For most people, they’ll be very happy to use the standard Nordic UART RX/TX connection profile. In this profile, the Bluefruit acts as a data pipe, that can ‘transparently’ transmit back and forth from your iOS or Android device.”

INewImage25

“Thanks to an easy-to-learn AT command set, Makers will have total control over how the device behaves, including the ability to define and manipulate your own GATT Services and Characteristics, or change the way that the device advertises itself for other Bluetooth Low Energy devices to see. You can also use the AT commands to query the die temperature, check the battery voltage, and more, check the connection RSSI or MAC address, and tons more.”

Additionally, the Bluefruit app enables Makers to quickly prototype their projects by using their iOS or Android device as a controller. Adafruit has a color picker, a quaternion/accelerometer/gyro/magnetometer, an eight-button gamepad and a GPS locator. This data can be read over BLE and relayed to the on-board ATmega32U4 for processing.

INewImage26

Interested in this un-BLE-ievable board? Head over to Adafruit’s official page to order yours.

CMYK 4.0 is a smart, foldable electric bike for your morning commute


This smart electronic bike will let you know the fastest, easiest and safest way to work.


Are you among the millions of city dwellers that ride a bike to work in the morning? If you’re looking to make your commute from home to the office a bit more efficient, then CMYK 4.0 may be for you. Created by New York City-based startup Brooklyness, the foldable electronic bike will automatically reroute you should there be any construction, traffic jams or pothole-filled streets in your way.

vpfmpo1flfu72jgiwpmo

The smart bike is packed with several features including advanced hardware and mobile integration. CYMK 4.0 is equipped with a gyroscope and an accelerometer to analyze the terrain and map the road, a cadence sensor to determine how fast you are pedaling and to adjust parameters for a smooth ride, a built-in heart rate monitor on its grips to track performance, and an Atmel MCU to process the information gathered by each of its sensors.

An accompanying app is tasked with crunching the collected data and displaying it on your smartphone over Bluetooth. What’s more, the e-bike boasts a phone charger directly on its handlebar so you can power your mobile device on-the-go, a 24V lithium battery, and a 250W motor that allows for 30 miles of assisted riding on a single charge.

e7khvfngjx5nyh2xtcoy

Not only does the e-bike’s embedded sensors determine the condition of the road as you ride it, upon getting to their destination, the app will prompt you to answer a few questions about the traveled course. The more people riding, the more data that can be garnered to generate a map of the best routes to take. This can help you decide which way to go in order to avoid Greenwich Village’s cobblestones, for example.

Its app also enables you keep tabs on performance by measuring things like calories burned, average heart rate, and peaks and lows so you can target which areas of your daily commute to increase speed. Aside from your smartphone, a web-based dashboard lets you take a closer look at battery rate of discharge, charging time and how power consumption changes along your route. You can even plan your commute and socialize with other cyclists to organize a group ride or to receive helpful advice.

gi65xhsyjvnetusv3w5p

Designed with safety and security in mind, the CMYK 4.0 includes an electronic lock that will sound if the bike is ever moved, an RFID tag for easy locating, app-controlled headlights for visibility, and laser beams that project a virtual lane on the road. Beyond that, the two-wheeler is super portable, weighing just 25 pounds and can be folded up to make for easily carrying on public transit or stowing away at work.

Looking for a new means of transportation to work? Hurry over to CMYK’s Indiegogo page, where the Brooklyness team is currently seeking $30,000. However, you’ll have to wait until March 2016 for delivery.

The CryptoCape is the BeagleBone’s first dedicated security daughterboard


The CryptoCape extends the hardware cryptographic abilities of the BeagleBone Black.


With the insecurity of connected devices called into question time and time again, wouldn’t it be nice to take comfort in knowing that your latest IoT gadget was secure? A facet in which many Makers may overlook, Josh Datko recently sought out to find a better way to safeguard those designs, all without hindering the DIY spirit. The result? The CrytpoCape — which initially debuted on SparkFun last year — is a dedicated security daughterboard for the BeagleBone that easily adds encryption and authentication options to a project.

Generally speaking, cryptography offers a solution to a wide-range of problems such as authentication, confidentiality, integrity and non-repudiation, according to Datko. SparkFun notes that the $60 Atmel powered cape adds specialized ICs that perform various cryptographic operations, amplifying a critical hardware security layer to various BeagleBone projects.

The CyrptoCape is packed with hardware, including 256k EEPROM with a defaulted I2C address (plus write protection), a real-time clock (RTC) module, a Trusted Platform Module (TPM) for RSA encryption/decryption, an AES-128 encrypted EEPROM, an ATSHA204 CrypoAuthentication chip that performs SHA-256 and HMAC-25 and an Atmel ATECC108 tasked with the Elliptic Curve Digital Signature Algorithm (ECDSA).

“You will also find an Atmel ATmega328P microcontroller and a large prototyping area available on the board. The ATmega is loaded with the Arduino Pro Mini 3.3V bootloader and has broken out most of the signals to surrounding pads,” its SparkFun page reveals.

Beyond that, each easy-to-use CryptoCape comes with pre-soldered headers making this board ready to be attached to your BeagleBone right out of the box. The only additional item a Maker will need to get the CryptoCape fully-functional is a CR1225 coin-cell battery.

Interested? You can check out the product’s official SparkFun page here. Meanwhile, those looking to learn more should also pick up a copy of Datko’s book entitled “BeagleBone for Secret Agents.” The third chapter of the resource is devoted to the CryptoCape where Makers will learn how to combine a fingerprint sensor, the on-board ATmega328P, and the crypto chips to make a biometric authentication system.

Control your connected devices with augmented cords


Inspired by a water hose, MIT’s Tangible Media Group wants you to control connected devices with their cords.


It happens all the time: You reach into your bag, pocket or desk to pull out your headphones. And, no matter how neatly they were wrapped up beforehand, the cords are a tangled mess. Pair this with the rise of wireless technologies, and you can see why they’ve gotten a bad rap throughout the years. However, what if those cables were used as an interface with your connected devices? Imagine if such things as tying knots, stretching, pinching and kinking the wire could actually control the flow of data and/or power of your gadgets.

Lamp1

That’s what one joint research team, led by Philipp Schoessler of MIT’s Tangible Media Group and Sang-won Leigh of the Fluid Interfaces Group, has set out to do. Aptly called Cord UIs, it’s a project that wants to turn cords into a user interface and hopefully give them a meaning other than simply a nuisance.

“Cord UIs are sensorial augmented cords that allow for simple metaphor-rich interactions to interface with their connected devices. Cords offer a large underexplored space for interactions as well as unique properties and a diverse set of metaphors,” Leigh writes. “We also look at ways to use objects in combination with augmented cords to manipulate data or properties of a device. For instance, placing a clamp on a cable can obstruct the audio signal to the headphones. Using special materials such as piezo copolymer cables and stretchable cords we built five working prototypes to showcase the interactions.”

The Tangible Media Group’s latest paper explains that despite the intensive research on wireless technologies typically associated with the rise of the Internet of Things, cords aren’t going to entirely disappear for quite some time. In fact, those ubiquitous wires hold some unique properties, thereby making them an interesting and useful tangible interface. Among their most notable properties are their wide-range of materials and form factors, which range from flexible and spiral to flat and rigid. This enables them to potentially be employed to offload interactions from a device and to offer quick and eyes-free interactions.

“Moreover, one of the underlying principles of tangible interface design is to augment everyday objects with technology aimed at exploiting real-world metaphors. Most interactions we describe in this paper evolved from the idea to regard the cord as a water hose and data or power as water flowing in this water hose.”

The basis of the interactions stem strongly from the metaphor of looking at the cord as a hose, while the power and data are the liquid flowing through it. Furthermore, the researchers explored other analogies, such as “breaking a connection” and “pulling something out of something,” that create a strong conceptual model that would assist in making these interactions much relatable and easier to comprehend.

Subsequently, the team classified these cord actions into three categories: touch, knot and objects. In order to explore some of their proposed interactions, they devised five prototypes — each of which work by augmenting the entire or parts of a cord. The prototypes were all comprised of readily available materials, sensors and cables, while an Atmel based Arduino was used to program the cords and control the sensor readings.

Imagine if tightening a knot could dim a lamp; attaching a clip on a power cord could put a computer to sleep; squeezing a headphone cable could temporarily mute the earbuds; kinking a power strip’s cord could toggle it on/off; and, stretching a USB cord could safe-eject the hard drive. Here’s a look at the five different ways the researchers are looking to redefine those once “dumb” wires.

Lamps

Lamp

“To detect a knot in a cord, and use it to adjust the brightness of a lamp by altering its tightness, we embedded a Flexpoint 2.2-inch bend sensor into wrap-around isolation together with a four-strand cable. Two of the strands were used to read out the sensor data. The other two strands were used to power the lamp. We used the microcontroller to read out the analog resistance value and to control the brightness of the light accordingly.”

Laptops

Power

“We augmented a MacBook power cord with conductive polymer sandwiched between two sheets of heavy copper foil. When applying pressure the resistance between the two copper sheets decreases. Since the power cord doesn’t offer the possibility to send any signals to the laptop we decided to send a long pulse (1000ms) by switching the power cord on/off using a relay. Using AppleScript we listen for this rising-edge ‘signal’ by checking if the computer AC power is connected or not. We then issue the command to go to sleep or wake up.”

Headphones

Headphones

“We use conductive yarn that we wove into the fabric of braided cable sleeving. The microcontroller detects touch via a large resistor (~1 MOhm) placed in series, which responds to any resistance changes following contact with the human body and ground. It can also detect the amount of pressure that is applied to the cord, since the resistance is inversely correlated to the area of human skin touching the cord. By temporarily shorting ground to the microphone input on an audio cable we can toggle the pause/resume functionality in an iPhone. We chose to use capacitive sensing over pressure sensors to detect pinching, to avoid accidental triggering in through cable stress.”

Power Strips

PowerPlug

“Alongside the power cord we placed a Piezo Copolymer Coaxial Cable from Measurement Specialties to detect kinks and switch on/off the power strip. The piezo polymer generates a voltage that is proportional to the amount of compression or stretch that is put on it. Piezo cables are often times used in traffic counting. To switch the power on/off we implemented a relay into a power strip that is controlled by a microcontroller.”

Hard Drives

Cable

“For the easy-eject hard drive we augmented a stretchable cord with a stretch sensor (resistive rubber) that decreases its resistance when expanded. We use a a special stretchable cord which is often used in robotics where it can help to reduce a lot of wear and tear caused by the moving robots. This cable can usually only be stretched up to 30% of its original length but by removing the curled strands from their original sleeving and threading it in rubber tubing we increased the stretch to more than 50%. To interpret a stretch and eject the hard drive we used openFrameworks in combination with AppleScript.”

The team notes that another potentially interesting area for further exploration is the actuation of cords. Meaning, Cord UIs could be used as output rather than only input, which would allow for ambient, audio, visual or haptic feedback about events or interactions. This project goes to show that there’s no reason these cables can’t become smarter, much like everything else these days. In fact, a majority of the interactions the team has suggested with Cord UIs would be inexpensive and easy for companies today to implement. Interested? You can read the entire research paper here.

What’s ahead this year in digital insecurity?


Here’s a closer look at the top 10 cyber security predictions for 2015.


In 2014 worries about security went from a simple “meh” to “WTF!” Not only did high-profile attacks get sensational media coverage, but those incidents led to a pivotal judicial ruling that corporations can be sued for data breaches. And as hard as it is to believe, 2015 will only get worse because attack surfaces are expanding as mobile BYOD policies overtake enterprises, cloud services spread, and a growing number of IoT networks get rolled out. Add m-commerce, e-banking, and mobile payments to the questionable tradition of lax credit card security infrastructure in the U.S. and you get a perfect storm for cybercrime.

In fact, 92% of attacks across the range of segments come from nine basic sources (seen in the diagram below), according to Verizon. More numerous and sophisticated cyber crimes are anticipated for this year and beyond.

z1

 1. More companies to get “Sony’d”

2014 saw the release of highly-evolved threats from criminals that in the past only came from governments, electronic armies and defense firms. A wide-range of targets included organizations in retail, entertainment, finance, healthcare, industrial, military, among countless other industries. As a repeat offender, Sony is now the cyber-victim poster child, and the term “Sony’d” has become a verb meaning digital security incompetence. Perhaps Sony’s motto should be changed from “make.believe.” to “make.believe.security.” Just saying!

Prior to 2014, companies on a wholesale basis tended to simply deny cyber vulnerabilities. However, a string of higher profile data breaches — such as Sony, Heartbleed, Poodle, Shellshock, Russian Cyber-vor, Home Depot, Target, PF Chang’s, eBay, etc. — have changed all of that. Denial is dead, but confusion and about what to do is rampant.

2. Embedded insecurity rising

Computing naturally segregates into embedded systems and humans sitting in front of screens.  Embedded systems are processor-based subsystems that are “embedded” into other machines or bigger systems.  Examples are routers, industrial controls, avionics, automotive engine and in-cabin systems, medical diagnostics, white goods, consumer electronics, smart weapons, and countless others.  Embedded security was not a big deal until the IoT emerged, which will lead to billions of smart, communicating nodes.  15 to more than 20 billion IoT nodes are being forecast by 2020, which will create a gigantic attack platform and make security paramount.

IoT Installed

A recent study by HP revealed that 70% of interconnected (IoT) devices have serious vulnerabilities to attacks. The devices they investigated consisted of “things” like cloud-connected TVs, smart thermostats and electronic door locks.

“The current state of Internet of Things security seems to take all the vulnerabilities from existing spaces — network security, application security, mobile security and Internet-connected devices — and combine them into a new, even more insecure space, which is troubling,” HP’s Daniel Miessler stated.

Issues HP identified ranged from weak passwords, to lack of encryption, to poor interfaces, to troubling firmware, to unencrypted updating protocols. Other notable findings included:

  • 60% of devices were subject to weak credentials
  • 90% collected personal data
  • 80% did not use passwords or used very weak passwords
  • 70% of cloud connected mobile devices allowed access to user accounts
  • 70% of devices were unencrypted

Investigators at the Black Hat Conference demonstrated serious security flaws in home automation systems. At DEFCON, investigators hacked NFC-based payment systems showing that passwords and account data was vulnerable. They also revealed that the doors of a Tesla car could be hacked to open while in motion. Nice! Other attacks were exploited on smart TVs, Boxee TV devices, smartphone biometric systems, routers, IP cameras, smart meters, healthcare devices, SCADA (supervisory, control and data acquisition) devices, engine control units, and some wearables. Even simple USB firmware was proven to be highly vulnerable… “Bad USB.”

These are just the tip of the embedded insecurity iceberg. Under the surface is the entire Dark Net which adds even more treacherousness. Security companies like Symmantic have identified home automation as a likely early IoT attack point. That is not surprising because home automation will be an early adopter of IoT technologies, after all. In-house appliances also represent an attractive attack surface as more firmware is contained in smart TVs, set top boxes, white goods, and routers that also communicate. Node-to-node connectivity security extends to industrial settings as well.

Tools like Shodan, which is the Google of embedded systems, make it very easy for hackers to get into the things in the IoT.  CNN recently called Shodan the scariest search engine on the Internet. You can see why since everything that is connected is now accessible. Clearly strong security, including hardware-based crypto elements, is paramount.

 3. More storms from the cloud

z5

It became clear in 2014 that cloud services such as iCloud, GoogleDrive, DropBox and others were rather large targets because they are replete with sensitive data (just ask Jennifer Lawrence). The cloud is starting to look like the technological Typhoid Mary that can spread viruses, malware, ransomware, rootkits, and other bad things around the world. As we know by now, the key to security is how well cryptographic keys are stored.   Heartbleed taught us that, so utilizing new technologies and more secure approaches to maintain and control cryptographic keys will accelerate in 2015 to address endemic cloud exposure. Look for more use of hardware-based key storage.

4. Cyber warfare breaks out

eBay, PF Chang’s, Home Depot, Sony, JP Morgan, and Target are well-known names on the cybercrime blotter, and things will just get worse as cyber armies go on the attack. North Korea’s special cyber units, the Syrian Electronic Army, the Iranian Cyber Army (ICA), and Unit 61398 of the People’s Liberation Army of China are high profile examples of cyber-armies that are hostile to Western interests. Every country now seems to have a cyber-army units to conduct asymmetric warfare. (These groups are even adopting logos, with eagles appearing to be a very popular motif.)

z6

Cyber warfare is attractive because government-built malware is cheap, accessible, and covert, and thus highly efficient. Researchers have estimated that 87% of cyber-attacks on companies are state-affiliated, 11% by organized crime, 1% by competitors, and another 1% by former employees. Long story short, cyber war is real and it has already been waged against non-state commercial actors such as Sony. It won’t stop there.

 5. Cybercrime mobilizes

According to security researchers, mobile will become an increasingly attractive target for hackers. Fifteen million mobile devices are infected with malware according to a report by Alcatel-Lucent’s Kindsight Security Labs. Malvertising is rampant on untrusted app stores and ransomware is being attached to virtual currencies. Easily acquired malware generation kits and source code make it extremely easy to target mobile devices. Malicious apps take advantage of the Webkit plugin and gain control over application data which hands credentials, bank account, and email details over to hackers. What’s more, online banking malware is also spreading. 2014 presented ZeuS, which stole data, and VAWTRAK that hit online banking customers in Japan.

Even two-factor authentication measures that banks employ have recently been breached using schemes, such as Operation Emmental. Emmental is the real name of Swiss cheese, which of course is full of holes just like the banking systems’ security mechanisms.  Emmental uses fake mobile apps and Domain Name System (DNS) changers to launch mobile phishing attacks to get at online  banking  accounts and steal identities. Some researchers believe that cybercriminals will increasingly use such sophisticated attacks to make illegal equity front running and short selling scams.

z7

6. Growing electronic payments tantalize attackers

Apple Pay could be a land mine just waiting to explode due to NFC’s susceptibility to hacking. Google Wallet is an example of what can happen when a malicious app is granted NFC privileges making it capable of stealing account information and money. M-commerce schemes like WeChat could be another big potential target.

z8

E-payments are growing and with that so will the attacks on mobile devices using schemes ranging from FakeID to master key. Master key is an exploit kit similar to blackhole exploit kit that specifically targets mobile, where FakeID allows malicious apps to impersonate legitimate apps that allow access to sensitive data without triggering suspicion.

7. Health records represent a cyber-crime gold mine

Electronic Health Records (EHR) are now mandatory in the U.S. and a vast amount of personal data is being collected and stored as never before. Because information is money, thieves will go where the information is (to paraphrase Willie Sutton). Health records are considered higher value in the hacking underground than stolen credit card data. Criminals throughout both the U.S. and UK are now specializing in health record hacking. In fact, the U.S. Identity Theft Resource Center reported 720 major data breaches during 2014 with 42% of those being health records.

8. Targeted attacks increase

Targeted attacks, also known as Advanced Persistent Threats (APTs), are very frightening due to their stealthy nature. The main differences between APTs and traditional cyber-attacks are target selection, silence, and duration of attack. According to research company APTnotes, the number of attacks by year went from 3 in 2010 to 14 in 2012 to 53 in 2014. APT targets are carefully selected, in contrast to traditional attacks that use any available corporate targets. The goal is to get in quietly and stay unnoticed for long periods of time, as seen in the famous APT attack that victimized the networking company Nortel. Chinese spyware was present on Nortel’s systems for almost ten years without being detected and drained the company of valuable intellectual property and other information. Now that’s persistent!

9. Laws and regulations try to play catch up

A number of cyber security laws are being considered in the U.S. including the National Cybersecurity Protection Act of 2014, which advocates the sharing of cybersecurity information with the private sector, provide technical assistance and incident response to companies and federal agencies.   Another one to note is the Federal Information Security Modernization Act of 2014 that is designed to better protect federal agencies from cyber-attacks. A third is the Border Patrol Agent Pay Reform Act of 2013 to recruit and retain cyber professionals who are in high demand. Additionally, there is the Cybersecurity Workforce Assessment Act, which aims to enhance the readiness, capacity, training, recruitment, and retention of the cybersecurity workforce. President Obama stated that wants a 30-day deadline for notices and a revised “Consumer Privacy Bill of Rights.”

One of the more interesting and intelligent recommendations came from the FDA, who issued guidelines for wireless medical device security to ensure hackers could not interfere with things such as implanted pacemakers and defibrillators. This notion was is part stimulated by worry about Dick Cheney’s pacemaker being hacked. In fact countermeasures were installed by on the device by Cheney’s surgeon. More regulation of health data and equipment is expected in 2015.

“Security — or the lack of it — will largely determine the success or failure of widespread adoption of internet-connected devices,” the FTC Commissioner recently shared in an article. The FTC also released a report entitled, “Privacy & Security in a Connected World.”

10. Hardware-based security may change the game

According to respected market researcher Gartner, all roads to the digital future lead through security. At this point, who can really argue with that statement? Manufacturers and service providers are seeing the seriousness of cyber-danger and are starting to integrate security at every connectivity level. Crypto element integrated circuits with hardware-based key storage are starting to be employed for that. Furthermore, these crypto elements are a kind of silver bullet given that they easily and instantly add the strongest type of security possible (i.e. protected hardware-based key storage) to IoT endpoints and embedded systems. This is a powerful concept whose fundamental value is only starting to be recognized.

IoT Node Chart 1

Crypto elements contain cryptographic engines to efficiently handle crypto functions such as hashing, sign-verify, ECDSA, key agreement (e.g.  ECDH), authentication (symmetric or asymmetric), encryption/decryption, message authentication coding (MAC), run crypto algorithms (e.g. elliptic curve cryptography, AES, SHA) and many other functions.

The hardware key storage plus crypto engine combination in a single device makes it simple, ultra-secure, tiny, and inexpensive to add robust security. Recent crypto element products offer ECDH for key agreement and ECDSA for authentication. Adding a device with both of these powerful capabilities to any system with a microprocessor that can run encryption algorithms (such as AES) brings all three pillars of security (confidentiality, data integrity and authentication) into play.

2014-Crypto-Security-at-our-Core-Atmel-Has-You-Covered

With security rising in significance as attack platforms increase in size and threats become more sophisticated, it is good to know that solutions are already available to ensure that digital systems are not only smart and connected, but robustly secured by hardware key storage. This could be the one of the biggest stories in security going forward.

Symmetric or asymmetric encryption, that is the question!


With the emergence of breaches and vulnerabilities, the need for hardware security has never been so paramount.


Confidentiality — one of the three foundational pillars of security, along with data integrity and authenticity — is created in a digital system via encryption and decryption. Encryption, of course, is scrambling a message in a certain way that only the intended party can descramble (i.e. decrypt) it and read it.

pillars

Throughout time, there have been a number of ways to encrypt and decrypt messages. Encryption was, in fact, used extensively by Julius Caesar, which led to the classic type of encryption aptly named, Caesar Cipher. The ancient Greeks beat Caesar to the punch, however. They used a device called a “Scytale,” which was a ribbon of leather or parchment that was wrapped around a rod of a diameter, of which only the sender and receiver were aware. The message was written on the wrapping and unfurled, then sent to the receiver who wrapped on on the rod of the same diameter in order to read it.

Skytale

 

Modern Encryption

Modern encryption is based on published and vetted digital algorithms, such as Advanced Encryption System (AES), Secure Hashing Algorithms (SHA) and Elliptic Curve Cryptography (ECC), among many others. Given that these algorithms are public and known to everyone, the security must come from something else — that thing is a secret cryptographic “key.” This fundamental principal was articulated in the 19th century by  Auguste Kerckhoffs, a Dutch linguist, cryptographer and professor.

Kerckhoffs’ principle states that a cryptosystem should be secure even if everything about the system, except the key, is public knowledge. In other words: “The key to encryption is the key.” Note that Kirchoffs advocated what is now commonly referred to as “open-source” for the algorithm. Point being, this open-source method is more secure than trying to keep an algorithm itself obscured (sometimes called security by obscurity). Because the algorithms are known, managing the secret keys becomes the most important task of a cryptographer. Now, let’s look at that.

kirchoff 1

Symmetric and Asymmetric

Managing the key during the encryption-decryption process can be done in two basic ways: symmetric and asymmetric. Symmetric encryption uses the identical key to both encrypt and decrypt the data. Symmetric key algorithms are much faster computationally than asymmetric algorithms because the encryption process is less complicated. That’s because there is less processing involved.

The length of the key size directly determines the strength of the security. The longer the key, the more computation it will take to crack the code given a particular algorithm. The table below highlights the NIST guidelines for key length for different algorithms with equivalent security levels.  You can see that Elliptic Curve Cryptography (ECC) is a very compact algorithm. It has a small software footprint, low hardware implementation costs, low bandwidth requirements, and high device performance. That is one of the main reasons that ECC-based asymmetric cryptographic processes, such as ECDSA and  ECDH, are now being widely adopted. The strength of the sophisticated mathematics of ECC are a great ally of all three pillars of security, especially encryption.

table

Not only is symmetric faster and simpler; furthermore, a shorter key length can be used since the keys are never made public as is the case with asymmetric (i.e. Public Key Infrastructure) encryption. The challenge, of course, with symmetric is that the keys must be kept secret on both the sender and receiver sides. So, distributing a shared key to both sides is a major security risk. Mechanisms that maintain the secrecy of the shared key are paramount. One method for doing this is called Symmetric Session Key Exchange.

Asymmetric encryption is different in that it uses two mathematically related keys (a public and private key pair) for data encryption and decryption.  That takes away the security risk of key sharing. However, asymmetric requires much more processing power. Unlike the public key, the private key is never exposed. A message that is encrypted by using a public key can only be decrypted by applying the same algorithm and using the matching private key.

A message that is encrypted by using the private key can only be decrypted by using the matching public key. This is sort of like mathematical magic. Some of the  trade offs of symmetric and asymmetric are summarized below.

Symmetric

  • Keys must be distributed in secret
  • If a key is compromised the attacker can decrypt any message and/or impersonate one of the parties
  • A network requires a large number of keys

Asymmetric

  • Around 1000 times slower than symmetric
  • Vulnerability to a “man-in-the-middle” attack, where the public key is intercepted and altered

Due to the time length associated with asymmetric, many real-world systems utilize combination of the two, where the secret key used in the symmetric encryption is itself encrypted with asymmetric encryption, and sent over an insecure channel.Then, the rest of the data is encrypted using symmetric encryption and sent over the insecure channel in the encrypted format. The receiver gets the asymmetrically encrypted key and decrypts it with his private key. Once the receiver has the symmetric key, it can be used to decrypt the symmetrically encrypted message. This is a type of key exchange.

Note that the man in the middle vulnerability can be easily addressed by employing the other pillar of security; namely authentication. Crypto engine devices with hardware key storage, most notably Atmel’s CrypotoAuthentication, have been designed specifically to address all three pillars of security in an easy to design and cost-effective manner. Ready to secure your next design? Get started here.

What is Ambient Security?

New technology and business buzzwords pop up constantly. Hardly a day goes by that you don’t see or hear words such as “cloud”, “IoT,” or “big data.” Let’s add one more to the list: “Ambient security.”

Ambient 1

You’ll notice that big data, the cloud, and the IoT are all connected, literally and figuratively, and that is the point. Billions of things will communicate with each other without human intervention, mainly through the cloud, and will be used to collect phenomenal and unprecedented amounts of data that will ultimately change the universe.

As everything gets connected, each and every thing will also need to be secure. Without security, there is no way to trust that the things are who they say they are (i.e. authentic), and that the data has not been altered (i.e. data integrity). Due to the drive for bigger data, the cloud and smart communicating things are becoming ambient; and, because those things all require security, security itself is becoming ambient as well.  Fortunately, there is a method to easily spread strong security to all the nodes. (Hint: Atmel CryptoAuthentication.)

Big Data

At the moment, big data can be described as the use of inductive statistics and nonlinear system analysis on large amounts of low density (or quickly changing) data to determine correlations, regressions, and causal effects that were not previously possible. Increases in network size, bandwidth, and computing power are among the things enabling this data to get bigger — and this is happening at an exponential rate.

Big data became possible when the PC browser-based Internet first appeared, which paved the way for data being transferred around the globe. The sharp rise in data traffic was driven to a large extent by social media and companies’ desire to track purchasing and browsing habits to find ways to micro-target purchasers. This is the digitally-profiled world that Google, Amazon, Facebook, and other super-disruptors foisted upon us.  Like it or not, we are all being profiled, all the time, and are each complicit in that process. The march to bigger data continues despite the loss of privacy and is, in fact, driving a downfall in privacy. (Yet that’s a topic for another article.)

Biggering

The smart mobile revolution created the next stage of “biggering” (in the parlance of Dr. Seuss). Cell phones metamorphosed from a hybrid of old-fashioned wired telephones and walkie-talkies into full blown hand-held computers, thus releasing herds of new data into the wild. Big data hunters can thank Apple and the Android army for fueling that, with help from the artists formerly known as Nokia, Blackberry, and Motorola. Mobile data has been exploding due to its incredible convenience, utility, and of course, enjoyment factors. Now, the drive for bigger data is continuing beyond humans and into the autonomous realm with the advent of the Internet of Things (IoT).

biggering 1

Bigger Data, Little Things

IoT is clearly looking like the next big thing, which means the next big thing will be literally little things. Those things will be billions of communicating sensors spread across the world like smart dust — dust that talks to the “cloud.”

big data

More Data

The availability of endless data and the capability to effectively process it is creating a snowball effect where big data companies want to collect more data about more things, ad infinitum. You can almost hear chanting in the background: “More data… more data… more data…”

More data means many more potential correlations, and thus more insight to help make profits and propel the missions of non-profit organizations, governments, and other institutions. Big data creates its own appetite, and the data to satisfy that growing appetite will derive from literally everywhere via sensors tied to the Internet. This has already started.

Sensors manufacture data. That is their sole purpose. But, they need a life support system including smarts (i.e. controllers) and communications (such as Wi-Fi, Bluetooth and others). There is one more critical part of that: Security.

No Trust? No IoT! 

There’s no way to create a useful communicating sensor network without node security. To put it a different way, the value of the IoT depends directly on whether those nodes can be trusted. No trust. No IoT.  Without security, the Internet of Things is just a toy.

What exactly is security? It can best be defined by using the three-pillar model, which (ironically) can be referred to as “C.I.A:” Confidentiality, Integrity and Authenticity.

pillars

CIA

Confidentiality is ensuring that no one can read the message except its intended receiver. This is typically accomplished through encryption and decryption, which hides the message from all parties but the sender and receiver.

Integrity, which is also known as data integrity, is assuring that the received message was not altered. This is done using cryptographic functions. For symmetric, this is typically done by hashing the data with a secret key and sending the resulting MAC with the data to the other side which does the same functions to create the MAC and compare. Sign-verify is the way that asymmetric mechanisms ensure integrity.

Authenticity refers to verification that the sender of a message is who they say they are — in other words, ensuring that the sender is real. Symmetric authentication mechanisms are usually done with a challenge (often a random number) that are sent to the other side, which is hashed with a secret key to create a MAC response, before getting sent back to run the same calculations. These are then compared to the response MACs from both sides.

(Sometimes people add non-repudiation to the list of pillars, which is preventing the sender from later denying that they sent the message in the first place.)

The pillars of security can be  implemented with devices such as Atmel CryptoAuthentication crypto engines with secure key storage. These tiny devices are designed to make it easy to add robust security to lots of little things – -and big things, too.

So, don’t ever lose sight of the fact that big data, little things and cloud-based IoT are not even possible without ambient security. Creating ambient security is what CryptoAuthentication is all about.