SEMICON West 2016

Authentication Strategies: Establishing Trust that You Are Who You Say You Are- Cary Eskow, AVNET (Room Keynote Stage, North Hall)

12 Jul 16
3:20 PM - 3:35 PM

Tracks: Extended Supply Chain Forum

Abstract:

For many devices deployed “at the edge” of connected systems- ranging from smart thermostats and emerging consumer products to process monitoring and mechatronics, authentication is critical. How can a remote system determine with a high-level of confidence, that the end-device is what it purports to be, and not a comprised or spoofed node offering an attacker easy entry into the system? Conversely, how can an end-device authenticate over-the-air firmware or other updates? Security is often described as a chain of trust. If not considered, these scenarios might be the “weakest link” in that chain. In this presentation, Cary will briefly outline some of the current hardware-level authentication strategies, implementation techniques and their tradeoffs.