If you have questions about products, pricing or services, get connected with an Avnet Sales Representative.

IoT Ecosystem: Microchip

IoT EcoSystem

A Complete IoT Security Platform

Connect Your Embedded System: from Sensor to Cloud

With a variety of wireless solutions, sensors and eXtreme Low Power microcontrollers, Microchip products enable end-to-end solutions that help you successfully connect your embedded system to the cloud and take advantage of all of the benefits of doing so. The Internet of Things takes advantages of Cloud Connected Embedded Systems. Cloud-Connected Embedded Systems can be found in products all around you. Products such as wearable fitness monitors, home security systems, home automation systems, garage door openers, industrial controls and many more.

A Cloud-Connected Embedded System connects either directly or indirectly to the internet and utilizes cloud-computing resources.

  • Remote command and control
  • Remote diagnostics and field re-programmability
  • Remote data storage and processing
  • Profile and status
  • Push notifications
  • Order fulfillment
  • Consumer insight and advertising

Watch this webinar to learn more about how Microchip is enabling the connected home; click here to access

IoT Security : Zero Touch Secure Provisioning solution

Since the IoT security paradigm is somewhat of a moving target—with multiple device types communicating with each other over a multitude of wired and wireless interfaces—IoT developers are relying on the expertise of chip suppliers that have years of experience in crypto hardware and security standards like TPM and Secure Hash Algorithm (SHA) and Elliptical Curve Cryptography (ECC). Microchip not only offers a range of security co-processors that are compatible with any MPU or MCU, but also powerful development tools to help you implement security co-processors in other words crypto-companion ICs more quickly into your embedded systems.

Primarily targeting cost-sensitive embedded applications, the ATSHA204A crypto element is based on SHA-based symmetric authentication and uses 4.5K bytes EEPROM. The ATAES132A crypto element, based on the Advanced Encryption Standard (AES), boasts 32K bytes of secure serial EEPROM to facilitate faster symmetric authentication.

The "Zero Touch Secure Provisioning Kit for AWS IoT” enables the mutual authentication security model from AWS. The kit uses the ATECC508A crypto engine uses Elliptic Curve Cryptography (ECC) to create secure, hardware-based key storage for IoT applications that include home automation, industrial networking and medical. It employs protected key storage as well as hardware acceleration of ECC cipher suites, including Elliptic Curve Digital Signature Algorithm (ECDSA) and key agreement with Elliptic Curve Diffie-Hellman (ECDH) techniques. It also ensures secure storage by utilizing the Hardware-TLS (HW-TLS) platform. The ATECC508A supports the CryptoAuth Xplained Pro evaluation and development kit and works with the CryptoAuthLib software support library. Proving that hardware-based security solutions do not need to be costly, the ATECC508A minimizes IT labor costs and licensing fees and is offered at very attractive prices for high-volume IoT applications. The user now have a true end to end secured solution from device to cloud.

To learn more about protecting devices and data from tampering or attack; check out the Avnet Hardware Hacker webinar series

Resources

Microchip

Secure Provisioning Kit

Microchip and Amazon Web Services worked together to release the Zero Touch Secure Provisioning Kit running on AWS IoT. It helps users comply with AWS IoT’s mutual authentication security model.

Part Details
Online Technical Course

Avnet IoT University

IoT Security – What do you really need on a connected node?

 

Register
Webinar

Avnet IoT Online Technical University

A Design Engineer’s Guide to Building the Industrial Internet of Things (IIoT)

View Training

The Critical Need for Device Security in the Internet of Things

Protecting your data and devices begins with encryption. This process ensures privacy, authenticity and security in communication. This overview provides you with the information you need to understand the various device-level encryption options.

Read More