Customers Can Quickly Collect And Display Authenticated Sensor Data

- Sep 01, 2020-

Now, it is said that MAXREFDES155#DeepCover® can be used more easily and quickly to design high-encryption authentication to protect the hardware of Internet of Things (IoT) devices and provide authenticity and authenticity of small data transactions between devices and the cloud. Completeness. Embedded security reference design provided by Maxim Integrated Products, Inc.

As more and more devices are connected to the Internet, security has become a key function for authenticating networked devices and sensors and ensuring the safe operation of sensor endpoints and controls. Using the elliptic curve digital signature algorithm (ECDSA) public key encryption technology, the MAXREFDES155# reference design makes it easy to develop devices that authenticate and manage sensor nodes that can be controlled and notified by a network server or network controller.

sensors data in cloud

Customers can quickly collect and display authenticated sensor data, as well as update the endpoints being monitored through secure communication with the cloud. This reference design is ideal for IoT devices used in a wide range of industrial applications from factory automation to smart agriculture.
The MAXREFDES155# platform includes an Arduino® size ARM mbed shield module and connected sensor endpoints. The protective cover contains the DS2476 DeepCover ECDSA/SHA-2 coprocessor, LCD, button controls, status LED and Wi-Fi® communication.

The sensor endpoints include DS28C36 DeepCover ECDSA/SHA-2 authenticator, infrared thermal sensor and aiming laser for infrared sensor. The reference design is equipped with a standard shielded connector and can be tested in real-time using an mbed board such as MAX32600MBED#. The combination of these two devices represents an IoT node.

The declared advantages include:

Accelerate the time to market: Use the provided hardware and source code to implement public key authentication node solutions and web server interfaces, thereby greatly reducing development time

Ease of use: The free evaluation web server provides a ready-to-use implementation that can be used in real time with IoT devices

Efficient encryption: Public key-based ECDSA implementation provides strong security and effective key distribution, which can be expanded from single-node to multi-node IoT deployment
Scott Jones, Executive Director of Embedded Security at Maxim Integrated, said: "Maxim brings decades of secure microcontroller, coprocessor, and authenticator development experience to our ever-expanding DeepCover reference design portfolio, making it easier for customers to implement their own Security." "This embedded security reference design uses ECDSA asymmetric authentication, which is the best solution for protecting IoT devices."

"The ability to protect connected devices and data paths is critical, but building viable endpoint security features is complicated and time-consuming." said Michael Horne, vice president of ARM's IoT business and vice president of marketing and sales. "The combination of the MAXREFDES155# board and the ARM mbed IoT device platform with ARMCortex®-M3 technology provides designers with a simplified way to quickly implement security functions suitable for IoT."

Previous:Chongqing Establishes Smart Sensor Technology Innovation Alliance To Boost The Development Of Sensor Industry Next:Shanghai Putuobu Built 110,000 IoT Sensors, And The City Has A Smart Brain