{"id":375,"date":"2020-10-30T14:28:20","date_gmt":"2020-10-30T13:28:20","guid":{"rendered":"http:\/\/blog.zhaw.ch\/industrie4null\/?p=375"},"modified":"2020-10-30T14:28:20","modified_gmt":"2020-10-30T13:28:20","slug":"security-by-design-for-iot-devices","status":"publish","type":"post","link":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/","title":{"rendered":"Security by Design for IoT Devices"},"content":{"rendered":"\n<p>A new Whitepaper shows how to apply a systematic design process to protect your IoT devices.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"908\" height=\"388\" src=\"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png\" alt=\"\" class=\"wp-image-376\" srcset=\"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png 908w, https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi-300x128.png 300w, https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi-768x328.png 768w, https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi-676x289.png 676w\" sizes=\"auto, (max-width: 908px) 100vw, 908px\" \/><\/figure>\n\n\n\n<p>Unprotected IoT devices are an easy target for cyber-attacks. The ZHAW Institute of Embedded Systems has published a Whitepaper that describes the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. The example of a simple WiFi-based sensor illustrates the design process and adequate protection measures. Microcontrollers featuring Trusted Execution Environments (TEE) as well as Secure Elements both provide options to store key material securely and perform cryptographic operations in an energy-efficient way. The interaction of these hardware components together with dedicated firmware and a Public Key Infrastructure (PKI) enables a low-power sensor to connect securely to the cloud.<\/p>\n\n\n\n<p>The Whitepaper and an accompanying video are available under <a rel=\"noreferrer noopener\" href=\"https:\/\/digitalcollection.zhaw.ch\/handle\/11475\/20718\" target=\"_blank\">https:\/\/digitalcollection.zhaw.ch\/handle\/11475\/20718<\/a><\/p>\n<div class=\"pt-sm\">Schlagw\u00f6rter: <a href=\"http:\/\/blog.zhaw.ch\/industrie4null\/tag\/embedded-system\/\">Embedded system<\/a>, <a href=\"http:\/\/blog.zhaw.ch\/industrie4null\/tag\/iot-security\/\">IoT security<\/a><br><\/div>","protected":false},"excerpt":{"rendered":"<p>A new Whitepaper shows how to apply a systematic design process to protect your IoT devices. Unprotected IoT devices are an easy target for cyber-attacks. The ZHAW Institute of Embedded Systems has published a Whitepaper that describes the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. [&hellip;]<\/p>\n","protected":false},"author":308,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[10,9],"features":[],"class_list":["post-375","post","type-post","status-publish","format-standard","hentry","category-allgemein","tag-embedded-system","tag-iot-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security by Design for IoT Devices - ZHAW Industrie 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security by Design for IoT Devices\" \/>\n<meta property=\"og:description\" content=\"A new Whitepaper shows how to apply a systematic design process to protect your IoT devices. Unprotected IoT devices are an easy target for cyber-attacks. The ZHAW Institute of Embedded Systems has published a Whitepaper that describes the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"ZHAW Industrie 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-30T13:28:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png\" \/>\n<meta name=\"author\" content=\"ruan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"ruan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/\"},\"author\":{\"name\":\"ruan\",\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/#\/schema\/person\/f5cefc356846d54e5bfdaec8fa0c3907\"},\"headline\":\"Security by Design for IoT Devices\",\"datePublished\":\"2020-10-30T13:28:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/\"},\"wordCount\":143,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png\",\"keywords\":[\"Embedded system\",\"IoT security\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/\",\"url\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/\",\"name\":\"Security by Design for IoT Devices - ZHAW Industrie 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png\",\"datePublished\":\"2020-10-30T13:28:20+00:00\",\"author\":{\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/#\/schema\/person\/f5cefc356846d54e5bfdaec8fa0c3907\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#primaryimage\",\"url\":\"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png\",\"contentUrl\":\"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/blog.zhaw.ch\/industrie4null\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security by Design for IoT Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/#website\",\"url\":\"https:\/\/blog.zhaw.ch\/industrie4null\/\",\"name\":\"ZHAW Industrie 4.0\",\"description\":\"Ein Blog der ZHAW Z\u00fcrcher Hochschule f\u00fcr Angewandte Wissenschaften\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.zhaw.ch\/industrie4null\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.zhaw.ch\/industrie4null\/#\/schema\/person\/f5cefc356846d54e5bfdaec8fa0c3907\",\"name\":\"ruan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/234dcd2344f7ff7df0de949d6c20a215c42d957a59fd50673614c35b8abd146c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/234dcd2344f7ff7df0de949d6c20a215c42d957a59fd50673614c35b8abd146c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/234dcd2344f7ff7df0de949d6c20a215c42d957a59fd50673614c35b8abd146c?s=96&d=mm&r=g\",\"caption\":\"ruan\"},\"url\":\"https:\/\/blog.zhaw.ch\/industrie4null\/author\/ruan\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security by Design for IoT Devices - ZHAW Industrie 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/","og_locale":"de_DE","og_type":"article","og_title":"Security by Design for IoT Devices","og_description":"A new Whitepaper shows how to apply a systematic design process to protect your IoT devices. Unprotected IoT devices are an easy target for cyber-attacks. The ZHAW Institute of Embedded Systems has published a Whitepaper that describes the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. [&hellip;]","og_url":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/","og_site_name":"ZHAW Industrie 4.0","article_published_time":"2020-10-30T13:28:20+00:00","og_image":[{"url":"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png","type":"","width":"","height":""}],"author":"ruan","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"ruan","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#article","isPartOf":{"@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/"},"author":{"name":"ruan","@id":"https:\/\/blog.zhaw.ch\/industrie4null\/#\/schema\/person\/f5cefc356846d54e5bfdaec8fa0c3907"},"headline":"Security by Design for IoT Devices","datePublished":"2020-10-30T13:28:20+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/"},"wordCount":143,"commentCount":0,"image":{"@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png","keywords":["Embedded system","IoT security"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/","url":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/","name":"Security by Design for IoT Devices - ZHAW Industrie 4.0","isPartOf":{"@id":"https:\/\/blog.zhaw.ch\/industrie4null\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#primaryimage"},"image":{"@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png","datePublished":"2020-10-30T13:28:20+00:00","author":{"@id":"https:\/\/blog.zhaw.ch\/industrie4null\/#\/schema\/person\/f5cefc356846d54e5bfdaec8fa0c3907"},"breadcrumb":{"@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#primaryimage","url":"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png","contentUrl":"https:\/\/blog.zhaw.ch\/industrie4null\/files\/2020\/10\/MIM_WiFi.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.zhaw.ch\/industrie4null\/2020\/10\/30\/security-by-design-for-iot-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/blog.zhaw.ch\/industrie4null\/"},{"@type":"ListItem","position":2,"name":"Security by Design for IoT Devices"}]},{"@type":"WebSite","@id":"https:\/\/blog.zhaw.ch\/industrie4null\/#website","url":"https:\/\/blog.zhaw.ch\/industrie4null\/","name":"ZHAW Industrie 4.0","description":"Ein Blog der ZHAW Z\u00fcrcher Hochschule f\u00fcr Angewandte Wissenschaften","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.zhaw.ch\/industrie4null\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/blog.zhaw.ch\/industrie4null\/#\/schema\/person\/f5cefc356846d54e5bfdaec8fa0c3907","name":"ruan","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/234dcd2344f7ff7df0de949d6c20a215c42d957a59fd50673614c35b8abd146c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/234dcd2344f7ff7df0de949d6c20a215c42d957a59fd50673614c35b8abd146c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/234dcd2344f7ff7df0de949d6c20a215c42d957a59fd50673614c35b8abd146c?s=96&d=mm&r=g","caption":"ruan"},"url":"https:\/\/blog.zhaw.ch\/industrie4null\/author\/ruan\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/posts\/375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/users\/308"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":2,"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/posts\/375\/revisions"}],"predecessor-version":[{"id":378,"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/posts\/375\/revisions\/378"}],"wp:attachment":[{"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/media?parent=375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/categories?post=375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/tags?post=375"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/blog.zhaw.ch\/industrie4null\/wp-json\/wp\/v2\/features?post=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}