The Embedded Industry evolved revolutionary in to connected world. The Internet of Things are not only capable of sharing analytical information on the network but has artificial intelligence for fault tolerance for the given environmental inputs. But at the same time these devices used frameworks and technologies which are not on security by design. These devices can be controlled over the Internet through conventional protocols. The development of many of these connected devices are archived by combining, rebuilding & and evolving the existing technologies and frameworks. The deep insight analysis of the technology used can provide us broaden scope for security loopholes in to these devices. And when a device in connected environment got hacked, it exposes entire enterprise/home network into attack. Therefor it is an immense need of defense in depth for connected IoT devices, starting from software technologies to in depth of hardware components.
An embedded electronic system with computational or storage capacity which can share the information or status to other system or controlled by other system over the network called and IoT device. The embedded device stack for security consist of Application, platform, Transmission Protocols, Bootloader, firmware, Kernel, RootFS, Hardware Protocols, Hardware SoC components. There is scope for hardening for security in each layer of the stack accordingly, because each layer of the stack has its possibility of exploitation.
The layered approach of secure implementation for Embedded device can make the world a better place for security. So, it starts from secure practices of protocols configurations to secure implementation of hardware components. The in-depth approach for encryption, encoding, obfuscation, symmetric keys and Public key infrastructure in different layers of architecture can assure the robustness of the complexity of security in Connected Embedded devices for integrity, privacy, protection & safety. The optimized level of protection needed for every layer of architecture since the business requirement of every system varies from one device to another and one component to another.