Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNoseda, Mario-
dc.contributor.authorRüst, Andreas-
dc.descriptionThis research was funded by Renesas Electronics Europe GmbH.de_CH
dc.description.abstractThe exponential growth of IoT makes it an increasingly tempting target for attackers. In addition to pure software vulnerabilities (like weak or hardcoded passwords, insecure data transfer and storage), the OWASP IoT Top Ten also lists hardware-related vulnerabilities such as the lack of physical hardening and the omission of a secure update mechanism. Mitigating these challenges requires additional hardware, as many of these devices are physically exposed and thus at a higher risk than conventional IT devices. More types of hardware solutions that implement the required functionality are entering the market; however, there are few to no performance comparisons. This lack further hinders the adoption of adequate solutions on a per-project basis. This white paper compares the performance of an MCU with an on-chip cryptographic engine to secure elements that connect to the host MCU over a serial bus.de_CH
dc.publisherZHAW Zürcher Hochschule für Angewandte Wissenschaftende_CH
dc.rightsLicence according to publishing contractde_CH
dc.subjectCrypto enginede_CH
dc.subjectSecure elementde_CH
dc.subjectEmbedded systemsde_CH
dc.subjectResource-constrained devicede_CH
dc.subject.ddc004: Informatikde_CH
dc.titleCrypto acceleration for IoT : a quantitative comparison of internal and external solutionsde_CH
dc.typeWorking Paper – Gutachten – Studiede_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitute of Embedded Systems (InES)de_CH
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
2021_Noseda-Ruest_Crypto-acceleration-for-IoT.pdf614.01 kBAdobe PDFThumbnail

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.