The counterfeit market for semiconductors is real, sizable and growing. Industry analysts peg the current market for fake semiconductors at $75B. Counterfeit chips pose great risk to driver comfort and safety, to say nothing of the severe negative consequences they present to automaker revenues and brand. The good news is there are immediate and cost-effective measures available to secure the semiconductor supply chain and stop counterfeiters in their tracks.
Provisioning & Key Management
The counterfeit market for semiconductors is real, sizable and growing. The Senate Armed Services Committee found over 1,800 cases where counterfeit electronic components were introduced into U.S. military hardware including airplanes, helicopters and missiles. Counterfeit chips pose serious risk to military equipment and the service personnel who depend on that hardware to perform their mission.
In this Frost & Sullivan analysis, the report describes key requirements in the Internet of Things (IoT) security market and presents details of how Rambus addresses these needs through effective, economical and easy-to-deploy IoT security solutions.
The CryptoManager Infrastructure is a high performance, secure transaction processing and data reporting system designed to securely manage provisioning, device personalization and high value key management throughout a semiconductor’s life cycle. As a critical part of the manufacturing and communications infrastructure, high availability, performance, and security are emphasized in all components of the CryptoManager Infrastructure. Security throughout the system is provided through the use of Hardware Security Modules (HSMs) in every node of the CryptoManager infrastructure. These FIPS 140-2 level 3 compliant HSMs provide tamper resistant secure storage and a secure computation environment for the necessary cryptographic computation and sensitive operations in the CryptoManager Infrastructure.
Objects, sensors, actuators and controllers that were once designed for stand-alone operation are now increasingly connected by means of intelligent software and networks – forming the basis of the Industrial Internet of Things (IIoT). To be sure, GE defines the IIoT as “a network of a multitude of devices connected by communications technologies that results in systems that can monitor, collect, exchange, analyze, and deliver valuable new insights.”
IIoT infrastructure, as well as the data it generates, must be protected against a wide range of cyber threats. Vulnerable devices can be hijacked and even physically disabled, while unencrypted or unverified data transmissions can be intercepted, leaked or spoofed. A leak or deliberate falsification of sensitive data could cause a halt in factory operations, electrical blackouts or malfunctioning water treatment centers.
Despite the real-world risks, IIoT operators are understandably concerned that implementation of a comprehensive security solution could pose integration challenges and incur additional costs. As such, the most effective security solution is one that does not negatively impact operations, reliability or profitability. Put simply, a practical, simple and secure solution that can be easily and widely adopted by IIoT OEMs and service providers is far more effective than a ‘super solution’ with only limited adoption.
The Rambus CryptoManager IoT Security Service is a turnkey security solution for IIoT OEMs and service providers. As we highlight in our white paper, our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks, including distributed denial of service (DDoS).
Smart cities present a huge market opportunity of $1.56 trillion. However, the interconnectedness of devices introduces cyber-physical technologies that link cyber systems to physical systems, thereby removing the barrier between the cyber and physical worlds in smart cities and expanding the potential attack surface for malicious actors. As such, connected smart city devices and services should be protected by a turnkey security solution that can be easily implemented, maintained and upgraded to meet the evolving challenges of a dynamic threat landscape.