Security can not be an afterthought for IoT and wearable devices, it must be designed in from the very beginning. It must be addressed in all phases of the project, including system design, test and validation.
Security tradeoffs and implementation will impact
- Hardware requirements and power consumption
- End-to-end connectivity
- Testing and validation
Why is IoT different than traditional cybersecurity?
- Hardware is often in uncontrolled locations
- Limited processing power of end nodes
Here are some good resources on IoT security that highlight the importance of security and its difficulty in small embedded devices. We are familiar with resources such as these and can use them to design your product.
In “IoT Security: The Ugly Truth,” Mike Muller, CTO at ARM, shows that the knowledge and experience are readily available, but need to be adapted and equipped to effectively interact with the Internet of Things.
Secure Push provides a unique Signalwall technology for IoT devices. Intrinsic ID also provides an interesting device authentication technology.
Wearable medical devices have additional requirements as outlined by the FDA. We have the knowledge to take care of compliance with FDA requirements.
“Content of Premarket Submissions for Management of Cybersecurity in Medical Devices, FDA, 2 Oct 2014, https://www.fda.gov/ucm/groups/fdagov-public/@fdagov-meddev-gen/documents/document/ucm356190.pdf
Postmarket Management of Cybersecurity in Medical Devices, FDA, 28 Dec 2016, https://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm482022.pdf