Understanding Security Keys in Bluetooth Low Energy

Learn the roles of the three security keys in Bluetooth LE—Long Term Key (LTK), Connection Signature Resolving Key (CSRK), and Identity Resolving Key (IRK). Before diving into the specifics of how Bluetooth Low Energy (LE) technology uses security keys (Figure 1), let's take a step back and lay the groundwork by understanding what a security … Read more

Vulnerabilities and Attacks on Bluetooth LE Devices—Reviewing Recent Info

To understand known vulnerabilities and attacks on Bluetooth LE devices, we review some studies from the past 4+ years. As our world continues to delve deeper into the age of digital connectivity, Bluetooth Low Energy (LE) has become a technological mainstay. Nestled within your everyday devices—be it your smartphone, wearable tech, or even your smart … Read more

Securing BLE Connections—An Overview of the Security Protocol

Learn about Bluetooth LE’s security features and tools, how to use them, and understand how they keep connections secure. Communication protocols like Bluetooth LE need to prioritize security. And there’s a good reason for that. They're carrying precious cargo: our data! Without these protocols, our sensor data, control messages, automation commands are all at risk. … Read more

A Primer on Power and EM Side-channel Attack Countermeasures and Prevention

Get a high-level understanding of designing electronics to prevent the threat of side-channel attacks (SCAs), namely power- and EM- (electromagnetic) based attacks. So far, in this article series, we’ve discussed what side-channel attacks or SCAs are, as well as specific types and examples of SCAs. Leveraging that knowledge, let's discuss some of the ways that we can design our … Read more

The Role of Remote Device Management in Edge Computing

Industry 4.0 is the age of data, wherein industries are leveraging the power of data to make intelligent devices that can make complex decisions on their own. The increasing need to make quick decisions in mission-critical applications has made edge computing popular in the industry. Edge computation devices deployed near the place of application are … Read more

Mitigating Smart Meter Security Risk: A Privacy-preserving Approach

This article provides techniques to safeguard against security threats and maintain the privacy of smart metering systems. Smart metering systems have transformed energy distribution systems by providing real-time energy consumption data and better energy management. However, the widespread use of smart meters has also introduced significant security risks that can compromise customer privacy and security. … Read more

A holiday shopping guide for engineers: 2022 edition

This’ll be the fourth consecutive year that EDN has published my ode to holiday-excused consumerism: here are the 2019, 2020 and 2021 editions (I skipped a few years between the 2014 edition and its successors). As before, I’ve included up-front links to the prior-year versions because I’ve done my best here to not regurgitate any … Read more

Smart home: 4 things you should know about Matter

The premise of the smart home is on the cusp of a rapid expansion with the adoption of the Matter standard that ensures interoperability and backward compatibility of connected devices from different manufacturers running various operating systems. ABI Research forecasts that, by 2030, more than 1.5 billion Matter-certified devices will ship annually. Consumer robotics, smart … Read more

Dual-core MCUs target edge processing in IoT, industrial

Industrial and Internet of Things (IoT) developers are increasingly looking to push the boundaries of what’s possible at the edge as they create new devices that can better anticipate and automate in smart homes, smart factories, and smart cities. Two new microcontrollers unveiled as part of NXP’s MCX N family promise to bolster processing at … Read more

3D perception software reduces LiDAR sensor false alarms

Quanergy has upgraded its QORTEX DTC 3D perception software to improve the accuracy of its MQ-8 series of LiDAR flow-management sensors. Accuracy improvements and the reduction of false alarms are the result of what the company believes is the industry’s first motion-based noise reduction mechanism and first occlusion filter/object stitching mechanism. QORTEX LiDAR-based software provides … Read more