SSZTD63A November 2024 – December 2024 CC2745P10-Q1 , CC2745R10-Q1 , CC2755R10 , CC3551E
With wireless connectivity innovations, the ability to connect devices has now expanded to everyday electronics, bringing intelligence to homes and vehicles (see Figure 1). More intelligence means more functionality and features: the ability to remotely monitor and control a device, augmented abilities with cloud computing, and faster software updates.
However, as our world becomes more connected, it’s crucial to protect these products from intrusion. From securing stored personal or sensitive application data to protecting data in transit and physical device security, engineers implementing wireless connectivity in their designs need to address system-level security capabilities earlier in the design process, while also meeting the relevant requirements of cybersecurity standards and regulations.
Likewise, the wireless microcontrollers (MCUs) helping expand connectivity also need to meet evolving security challenges and cybersecurity standards and regulations.
In this article, we’ll explore evolving wireless connectivity security challenges in connected automotive and smart home applications – specifically car access, smart thermostats, and smart sensors and e-locks – and the MCUs designed to address these challenges.
Bluetooth® Low Energy (BLE) wireless connectivity is used in car access solutions to range and localize the vehicle keys. Security threats can lead to compromised car access security, potentially leading to the theft of a vehicle or belongings.
OEMs need to consider access security at multiple levels, including:
Additionally, there are regulations for automotive cybersecurity in many regions, with standards such as International Organization for Standardization 21434 that require compliance with relevant cybersecurity processes during device development and maintenance.
A smart thermostat (see Figure 2) is a great example of the benefits and threats faced when looking at smart home technology. These devices allow homeowners to adjust the temperature of their home from anywhere and optimize energy usage through integrated Wi-Fi® connectivity.
Unfortunately, increased connectivity can expose thermostats to threats. For example, hackers could transmit maliciously crafted frames over the air to interrupt the thermostat’s operation, or force it off the network. Intentionally kicking the device off the network and monitoring transmissions after reconnecting makes it possible to capture and decrypt data using a brute force or dictionary attack, resulting in the exposure of user or vendor data and credentials. Data can be captured through a remote man-in-the-middle attack by sending malicious data or code (such as malware) to the thermostat over the internet or transmitting data between it and a remote cloud server.
To mitigate, designers must follow the latest Wi-Fi security standards, which outline proven cryptographic algorithms for authentication, key agreement and encryption, and mandate protocols for protecting management frames, such as Wi-Fi Protected Access 3. These devices need to support the latest network security protocols (such as Transport Layer Security v1.3) for protecting internet-transmitted data. Furthermore, devices need to run these protocols efficiently and securely store keys used during their execution.
Battery-operated devices including smart sensors (motion, door, window sensors) and e-locks, as shown in Figure 3, are increasingly using mesh technologies such as Zigbee®, Thread and Matter to meet low-power requirements while still connecting to the cloud through a smart home hub. Security threats like sniffing, man in the middle and device takeover could potentially compromise device data or secure operation (for example, e-lock access granted to a bad actor). In extreme cases, a compromised device could compromise the smart home network or ecosystem.
Securing these networks requires securing the communication channel between the sensor and hub so that only trusted devices can join the network.
Matter was designed to simplify development and provide improved protocol-level security for smart home products. In addition to securing the communication channel through a strong cryptographic suite such as Advanced Encryption Standard for confidentiality, secure hash algorithms for integrity, and elliptic-curve cryptography for key exchange and digital signatures, Matter uses certificates and passcode-based protocols to authenticate smart home devices and ensure that only genuine products join an ecosystem.
To mitigate security risks, wireless MCUs should enable secure data communication, secure key exchange, mutual authentication, secure key storage, secure firmware updates, and secure boot operations.
Wireless MCUs such as the CC2745P10-Q1, CC2755R10, and CC3551E offer integrated security features to mitigate risks caused by malware and device takeover attacks. They support fundamental security features like secure boot and secure firmware updates with rollback protection. These MCUs feature an integrated hardware security module (HSM) with a dedicated controller for handling hardware-accelerated cryptographic operations, secure key storage, and random number generation. The HSM provides a trusted environment for cryptographic and key handling operations, thereby helping mitigate data privacy and advanced malware risks. The Arm® Cortex®-M33 core in these MCUs supports TrustZone-M, which further enables a trusted execution environment for secure software operation.
All trademarks are the property of their respective owners.