Telecoms, Datacoms, Wireless, IoT


NXP’s EdgeLock provides secure enclave for IoT devices

28 April 2021 Telecoms, Datacoms, Wireless, IoT

NXP Semiconductors has unveiled the EdgeLock secure enclave, a preconfigured, self-managed and autonomous on-die security subsystem that offers intelligent protection for Internet of Things (IoT) edge devices against attacks and threats. Fully integrated as a built-in security subsystem across NXP’s upcoming i.MX 8ULP, i.MX 8ULP-CS and i.MX 9 applications processors, it eases the complexity of implementing robust, system-wide security intelligence for IoT applications.

This secure enclave enables developers to more easily achieve their security goals, freeing them to focus on new ways to differentiate their edge applications. By integrating secure enclave into many upcoming EdgeVerse processor families, NXP will provide developers with a wide range of scalable options to more easily deploy state-of-the-art security in thousands of edge applications including smart home devices, wearables, portable healthcare devices, smart appliances, embedded controls and industrial IoT systems.

“Billions of IoT products deployed at the edge have become attractive targets for attacks. Providing a security framework based on strong isolation enables device makers to focus on the functionality and rely on the tested and proven security from NXP,” said Wolfgang Steinbauer, vice president and head of Crypto and Security, NXP. “Building on NXP’s strong history of providing end-to-end security solutions, we’ve engineered the EdgeLock secure enclave to simplify the deployment of robust security mechanisms and meet the ever-increasing demand for scalable, easy-to-implement IoT security. Embedded developers can now focus on their applications and time-to-market challenges and let the EdgeLock secure enclave technology handle the underlying complexities of securing the IoT.”

‘Security HQ’, a fortress in a chip

The self-contained, on-die hardware security subsystem has its own dedicated security core, internal ROM, secure RAM and supports state-of-the art side channel attack resilient symmetric and asymmetric crypto accelerators and hashing functions, providing an array of security services to the other user-programmable cores within the SoC. In essence, the secure enclave functions like a security headquarters or fortress inside the system-on-chip (SoC), storing and protecting key assets, including root of trust and crypto keys to protect the system against physical and network attacks.

This subsystem is isolated from the other processor cores that handle applications and real-time processing functions. This physically-siloed architecture supports a well-defined security perimeter within the SoC, simplifies development of secure IoT products and enhances SoC and application security by isolating secure key store management, cryptography and other important security features.

Beyond crypto

The secure enclave provides flexible policies and controls that extend security practices beyond mainstream cryptography. It enables autonomous management of critical security functions including silicon root of trust, run-time attestation, trust provisioning, SoC secure boot enforcement, fine-grained key management augmented by extensive crypto services for advanced attack resistance, while also simplifying the path to security certifications.

Advanced tamper detection and response techniques protect the entire root of trust, ensuring functional integrity during operation of the secured processor. When an attack is detected, the secure enclave system is designed to block it.

The EdgeLock secure enclave is designed to intelligently track power transitions when end-user applications are running on the processors. This unique ‘power-aware’ capability enhances resistance and prevents new attack surfaces from emerging by enforcing security policies when the application processor’s heterogeneous cores enter different power modes.

It uses managed agents to extend security across the SoC domains outside of the security HQ. These autonomous agents establish and maintain system-wide security capabilities, manage keys and enforce policies across domains. The agents operate independently through private buses within the SoC to ensure that other system domains, for example, those running Linux or an RTOS, are always protected, especially during power mode transitions.

Preconfigured security policies help developers reduce the complexity of security implementations and avoid costly integration errors for faster time to market. The EdgeLock secure enclave supports provisioning services outside of the enclave, offering a simpler path to security certifications. This on-die security technology also supports the latest IoT use cases such as secure connection to public/private clouds, device-to-device authentication and sensor data protection.

The EdgeLock secure enclave will be fully integrated as a standard security feature across i.MX 8ULP, i.MX 8ULP-CS and i.MX 9 applications processor families and more upcoming EdgeVerse products.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

SMT-mountable card connectors
Telecoms, Datacoms, Wireless, IoT
Würth Elektronik introduces four new SMT-mountable Nano SIM and microSD card connectors and expands its range with solutions for the smallest packages.

Read more...
Module for smart city and smart utility devices
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Quectel Wireless Solutions has launched the Quectel KCM0A5S, a high-performance Wi-SUN module designed for smart applications such as street lighting, precision agriculture, industrial IoT, smart meters and smart cities.

Read more...
Dual-range IMU with edge processing
EBV Electrolink Analogue, Mixed Signal, LSI
ST’s innovative LSM6DSV80X combines two accelerometer structures for 16 g and 80 g full-scale sensing, a gyroscope up 4000 dps, and embedded intelligence in a single component.

Read more...
Ultra-low-power wireless module
Altron Arrow Telecoms, Datacoms, Wireless, IoT
The STM32WBA5MMG from STMicroelectronics is an ultra-low-power, small form factor, certified 2,4 GHz wireless module that supports Bluetooth LE, Zigbee 3.0, OpenThread, and IEEE 802.15.4 proprietary protocols.

Read more...
Quectel partners with GEODNET
Quectel Wireless Solutions Telecoms, Datacoms, Wireless, IoT
Quectel Wireless Solutions has partnered with GEODNET to deliver Quectel’s Real-Time Kinematic (RTK) correction services, enabling high-precision positioning for IoT applications.

Read more...
Bringing Bluetooth Channel Sounding to automotive and beyond with KW47
Altron Arrow Telecoms, Datacoms, Wireless, IoT
NXP’s new Channel Sounding-certified KW47 and MCX W72 wireless MCUs are set to help automakers with distance measurement, bringing an additional ranging solution for car access and autonomous systems, and will be utilised across a broader spectrum of applications.

Read more...
Dual-band GNSS antenna
RF Design Telecoms, Datacoms, Wireless, IoT
The Taoglas Accura GVLB258.A, is a passive, dual-band GNSS L1/L5, high-performance antenna for high precision GNSS accuracy and fast positioning.

Read more...
What is Wi-Fi HaLow and why choose it for IoT?
iCorp Technologies Editor's Choice Telecoms, Datacoms, Wireless, IoT
Wi-Fi HaLow introduces a low power connectivity option that, in contrast to other Wi-Fi options, offers greater range of approximately 1 km, which opens up a raft of IoT use cases.

Read more...
Wi-Fi 6 and Bluetooth LE coprocessor module
Altron Arrow Telecoms, Datacoms, Wireless, IoT
The ST67W611M1 from STMicroelectronics boasts an all-in-one design which, together with its capabilities, contribute to making it an attractive choice for IoT edge devices requiring a single-chip solution.

Read more...
Futureproofing IoT connectivity
SIMcontrol Telecoms, Datacoms, Wireless, IoT
A managed private APN assigns every device to an isolated carrier slice, producing a single ingress to the enterprise network, with traffic bypassing shared internet paths and reducing exposure.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved