{"id":20019,"date":"2023-01-26T09:00:00","date_gmt":"2023-01-26T08:00:00","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=20019"},"modified":"2023-06-19T16:54:39","modified_gmt":"2023-06-19T14:54:39","slug":"this-is-how-mathematics-keeps-your-iot-device-safe","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/","title":{"rendered":"This is How Mathematics Keeps Your IoT Device Safe"},"content":{"rendered":"\n<p>The Internet of Things (IoT) is a paradigm expected to bring about a new era of connectedness and collaboration, and is already <strong>revolutionizing the way we live and work<\/strong>. However, it comes with a number of new security challenges. Because IoT devices are often connected to sensitive data and systems, they can be attractive targets for attackers. The amount and variety of devices connected to the internet is constantly increasing, as is the quantity&nbsp; of data generated. This data is often sensitive, confidential, or both.<\/p>\n\n\n\n<p>One way to protect this data is through the use of cryptographic algorithms, the mathematical equations used to encode and decode data. This article with insights from <a href=\"https:\/\/eu.mouser.com\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">Mouser Electronics<\/a> explores how electronic devices use <strong>complex cryptographic algorithms<\/strong> to keep our information safe from attacks in IoT environments, and how hardware accelerators with cryptographic functions are being used to make this possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-abc-of-cryptographic-functions\">The ABC of cryptographic functions<\/h2>\n\n\n\n<p>Cryptographic algorithms are mathematical functions that are used to encrypt and decrypt data. These algorithms are designed to be very difficult to break, making them essential for keeping information safe. Cryptographic hardware accelerators are specialized microchips or security coprocessors that are <strong>designed to perform cryptographic algorithms very quickly<\/strong>. These kinds of devices can achieve complex cryptographic functions faster than software-based algorithms.&nbsp;<\/p>\n\n\n\n<p>There are three main types of cryptographic algorithms: message authentication, message integrity, and security functions.<\/p>\n\n\n\n<p><strong>1) Message Authentication<\/strong><br>A Message Authentication Code (MAC) is a cryptographic checksum on data that is used to detect whether a message has been tampered with. A MAC algorithm uses a secret key to generate a message digest, which is then appended to the message. The message and digest are then sent to the receiver, who uses the same secret key to generate a message digest from the received message. If both digests match, the receiver knows there&#8217;s been no tampering.&nbsp;<\/p>\n\n\n\n<p><strong>2) Message Integrity<\/strong><\/p>\n\n\n\n<p>Message integrity is the ability of a message to resist modification or corruption while in transit. Integrity is important because it ensures that the message received is the same message that was sent. To achieve message integrity, cryptographic hash functions are used. <strong>A cryptographic hash function takes an arbitrary block of data and produces a fixed-size hash value<\/strong>. The hash value is a summary of the original data, and it is nearly impossible to produce the same hash value from two different pieces of data.&nbsp;<\/p>\n\n\n\n<p><strong>3) Security Functions<\/strong><\/p>\n\n\n\n<p>Cryptographic algorithms are used in a variety of security functions, including digital signatures, key exchange, and encryption. A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. Encryption is the process of transforming readable data into an unreadable format that protects it from being read if intercepted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-main-threats-of-iot-devices-today\">Main Threats of IoT Devices Today<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1011\" height=\"675\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/clint-patterson-dYEuFB8KQJk-unsplash-scaled.jpg\" alt=\"hacker community dev\" class=\"wp-image-6118\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/clint-patterson-dYEuFB8KQJk-unsplash-scaled.jpg 1011w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/clint-patterson-dYEuFB8KQJk-unsplash-scaled-300x200.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/clint-patterson-dYEuFB8KQJk-unsplash-scaled-768x513.jpg 768w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2020\/06\/clint-patterson-dYEuFB8KQJk-unsplash-scaled-600x400.jpg 600w\" sizes=\"auto, (max-width: 1011px) 100vw, 1011px\" \/><figcaption class=\"wp-element-caption\">IoT devices are subject to different kinds of attacks.<\/figcaption><\/figure>\n\n\n\n<p>The number of IoT devices connected to the internet makes them desirable prey for malicious hackers. There are a few types of attacks that these devices often encounter:<\/p>\n\n\n\n<p><strong>1) Random data or fuzzing attacks<\/strong>: Fuzzing attacks involve feeding random data to an application or system in order to crash it or force it to reveal information. This type of attack can be difficult to detect and can be used to exploit vulnerabilities in a system.<br><\/p>\n\n\n\n<p><strong>2) Rowhammer attacks<\/strong>: Rowhammer attacks exploit a hardware vulnerability in some types of DRAM (dynamic random-access memory) chips. This type of attack can be used to gain access to sensitive data or to cause denial-of-service conditions.<br><br><strong>3) Side-channel attacks<\/strong>: Side-channel attacks exploit the side effects of cryptographic algorithms that can leak information about the algorithm or the data being processed. This type of attack can be used to break the security of cryptographic systems.<\/p>\n\n\n\n<p><strong>4) Trial and error attacks: <\/strong>Trial and error attacks involve trying different values for a secret key until the correct value is found. This type of attack can be used to break the security of cryptographic systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mutual-authentication-a-practical-example\">Mutual authentication: a practical example<\/h2>\n\n\n\n<p>As we mentioned, cryptography can play a vital role in securing the IoT. It&nbsp; can be used to protect data in transit to authenticate devices and users, and to <strong>provide access control<\/strong>. In this section, we will focus on how cryptography can be used for mutual authentication, which is a crucial security measure for IoT devices.&nbsp;<\/p>\n\n\n\n<p>Mutual authentication is a process in which both parties in a communication verify each other&#8217;s identity. This is in contrast to single-factor authentication, in which only one party (usually the user) is authenticated. <strong>Mutual authentication is important for IoT devices because it helps to ensure that data is only exchanged between legitimate devices<\/strong>. Furthermore, mutual authentication can help to prevent man-in-the-middle attacks, in which an attacker intercepts communication between two parties and impersonates one of them.&nbsp;<\/p>\n\n\n\n<p>Azure RTOS is a secure operating system that provides a foundation for building reliable and secure applications. The RTOS includes a number of security features, including support for PKCS#11, which is a standard interface that allows an operating system to communicate with a hardware security module (HSM).&nbsp;<\/p>\n\n\n\n<p>The Azure RTOS supports a number of HSMs, including the ATECC608 and TA100 secure elements from Microchip Technology. The <a href=\"https:\/\/eu.mouser.com\/new\/microchip\/microchip-atecc608b-crypto-devices\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">ATECC608 TrustFLEX Secure Element<\/a> is a hardware-based security module that can be used to store sensitive data, such as cryptographic keys. It includes a built-in true random number generator (TRNG), which can be used to generate the shared secret.<\/p>\n\n\n\n<p>Secure Boot is a security feature that is built into Azure RTOS. It ensures that only signed, approved software can run on the system. This helps to protect the system from malicious code and other security threats.<\/p>\n\n\n\n<p><strong>Using mutual authentication with Azure RTOS<\/strong><\/p>\n\n\n\n<p>To use mutual authentication with Azure RTOS and the ATECC608, we will first need to generate a shared secret. We can do this using the TRNG on the ATECC608. Next, we will need to compute the MAC for each message that is sent. To do this, we will use the HMAC-SHA256 algorithm, which is a standard message authentication algorithm. <strong>The shared secret and the message will be used as inputs to the HMAC-SHA256 algorithm, and the output will be the MAC<\/strong>. Finally, we will need to verify the MAC on each message that is received. To do this, we will use the same shared secret and HMAC-SHA256 algorithm. If the MAC is valid, then we can be sure that the message came from a legitimate device. Using mutual authentication can help to ensure that data is only exchanged between legitimate devices. It can also help to prevent man-in-the-middle attacks. Mutual authentication is a crucial security measure for IoT devices, and the Azure RTOS platform and ATECC608 TrustFLEX Secure Element can be used to implement it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"759\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1345487051-1024x759.jpg\" alt=\"microchips, IoT security.\" class=\"wp-image-20035\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1345487051-1024x759.jpg 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1345487051-300x222.jpg 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1345487051-768x569.jpg 768w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1345487051.jpg 1189w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Microchip technology is paramount to IoT security.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-more-resources-for-boosting-iot-security\">More resources for boosting IoT security<\/h2>\n\n\n\n<p>There are <a href=\"https:\/\/eu.mouser.com\/applications\/internet-of-things\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">many products available<\/a> from Mouser that can be used to build your IoT networks such as sensors, development platforms, and connectivity devices, but when it comes to the IoT, security cannot be overlooked. Solutions need to cover both software and hardware attacks and include features for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure Boot<\/li>\n\n\n\n<li>Secure OTA firmware update<\/li>\n\n\n\n<li>Secure Key storage<\/li>\n\n\n\n<li>Authentication<\/li>\n\n\n\n<li>Encryption<\/li>\n\n\n\n<li>Serial bus encryption<\/li>\n\n\n\n<li>Hardware attacks and tamper protection<\/li>\n\n\n\n<li>Detecting and managing abnormal situations<\/li>\n\n\n\n<li>IP protection for software<\/li>\n<\/ul>\n\n\n\n<p>And the above are only a few of the possibilities. Today, it is possible (and necessary) to find devices and solutions that <strong>help protect IoT products from the initial design and manufacturing stages to the very end of the product\u2019s lifecycle<\/strong> in order to comply with major IoT certification requirements and ensure the highest level of security.<\/p>\n\n\n\n<p>In addition to the Microchip ATECC608 example explained earlier on in this article, several manufacturers offer hardware and ecosystem support to protect IoT devices from attack, thanks to these essential security features. Some examples are:<\/p>\n\n\n\n<p><strong>Integrated Crypto Controllers<\/strong> such as the<a href=\"https:\/\/eu.mouser.com\/new\/maxim-integrated\/maxim-deepcover-crypto-controller\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\"> Maxim Integrated DeepCover Crypto Controller<\/a> are among other devices that implement cryptographic functions out of the box. This particular one is a security coprocessor that provides turnkey cryptographic functions ranging from Key exchange and TLS secure communication to anti-cloning, anti-counterfeiting, feature and usage control.<\/p>\n\n\n\n<p><strong>Authentication ICs, <\/strong>like the <a href=\"https:\/\/eu.mouser.com\/new\/stmicroelectronics\/stm-stsafe-a110-authentication-ic\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">STMicroelectronics STSAFE-A110<\/a>, provide authentication and secure data management services to a local or remote host. The STSAFE-A100 is the latest generation of highly secure MCUs, featuring both advanced asymmetric and symmetric cryptography, and a secure operating system with kernel for authentication and data management, and protection against logical and physical attacks.<\/p>\n\n\n\n<p><strong>Plug &amp; Trust Elements <\/strong>offer robust defense against different attack scenarios as well as an expanded feature set for a wide range of IoT use cases. The <a href=\"https:\/\/eu.mouser.com\/new\/nxp-semiconductors\/nxp-edgelock-se050\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">NXP Semiconductors EdgeLock\u00ae SE050 Plug &amp; Trust Secure Element Family<\/a>, a ready-to-use solution for IoT devices at the IC level, provides true end-to-end security from the edge to the cloud without the requirement for security codes, essential keys, or credentials.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusions-and-main-takeaways\">Conclusions and main takeaways<\/h2>\n\n\n\n<p>Data is becoming more valuable than ever, and this trend is likely to continue and evolve in the future. As <a href=\"https:\/\/www.codemotion.com\/magazine\/infographics\/iot-trends-and-buzzwords-today\/\" target=\"_blank\" aria-label=\"IoT devices become more pervasive in our lives (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">IoT devices become more pervasive in our lives<\/a>, <strong>so does the importance of having strong cybersecurity mechanisms<\/strong> to protect them against malicious attacks.&nbsp;<\/p>\n\n\n\n<p>This article explored the main cryptographic techniques to protect IoT devices from attacks, the more frequent kinds of attacks that these devices experience and, the main products that are ideal for achieving state-of-the-art protection in today&#8217;s scenario.<br>For more in-depth technical information about these IoT security devices and solutions, visit the security hub on <a href=\"https:\/\/resources.mouser.com\/security\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"ek-link\">Mouser Electronics\u2019<\/a> website.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.mouser.com\/applications\/internet-of-things\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"250\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/1Banner_Mouser-1-1.png\" alt=\"\" class=\"wp-image-20027\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/1Banner_Mouser-1-1.png 975w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/1Banner_Mouser-1-1-300x77.png 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/1Banner_Mouser-1-1-768x197.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) is a paradigm expected to bring about a new era of connectedness and collaboration, and is already revolutionizing the way we live and work. However, it comes with a number of new security challenges. Because IoT devices are often connected to sensitive data and systems, they can be attractive targets&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/\">Read more<\/a><\/p>\n","protected":false},"author":58,"featured_media":20028,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":6,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[9883],"tags":[9902],"collections":[],"class_list":{"0":"post-20019","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-iot","8":"tag-cybersecurity","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Role of Mathematics in IoT Security - Codemotion Magazine<\/title>\n<meta name=\"description\" content=\"Discover more about algorithms and devices for maximising IoT security in this guide with insights from Mouser electronics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This is How Mathematics Keeps Your IoT Device Safe\" \/>\n<meta property=\"og:description\" content=\"Discover more about algorithms and devices for maximising IoT security in this guide with insights from Mouser electronics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-26T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-19T14:54:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1365\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Norman Di Palo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Norman Di Palo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/\"},\"author\":{\"name\":\"Norman Di Palo\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/55131e26e4c59236d55c04a6bb1363d0\"},\"headline\":\"This is How Mathematics Keeps Your IoT Device Safe\",\"datePublished\":\"2023-01-26T08:00:00+00:00\",\"dateModified\":\"2023-06-19T14:54:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/\"},\"wordCount\":1583,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"IoT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/\",\"name\":\"The Role of Mathematics in IoT Security - Codemotion Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg\",\"datePublished\":\"2023-01-26T08:00:00+00:00\",\"dateModified\":\"2023-06-19T14:54:39+00:00\",\"description\":\"Discover more about algorithms and devices for maximising IoT security in this guide with insights from Mouser electronics.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg\",\"width\":1365,\"height\":768,\"caption\":\"Cyber security concept. Encryption. Data protection. Anti virus software. Communication network.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backend\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/backend\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IoT\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/backend\/iot\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"This is How Mathematics Keeps Your IoT Device Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/55131e26e4c59236d55c04a6bb1363d0\",\"name\":\"Norman Di Palo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/03\/norman-di-palo-100x100.jpeg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/03\/norman-di-palo-100x100.jpeg\",\"caption\":\"Norman Di Palo\"},\"description\":\"My name is Norman Di Palo, I\u2019m a Robotics and Artificial Intelligence student, researcher and consultant from Rome, Italy. I'm a public speaker and I've given several talks at tech events. I am founder and consultant for startups in Rome and Palo Alto. I write about my work and research on my blog, that is read by tens of thousands of people. I mostly enjoy robotics, deep learning, design, vinyls, and good coffee.\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/norman-di-palo\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Role of Mathematics in IoT Security - Codemotion Magazine","description":"Discover more about algorithms and devices for maximising IoT security in this guide with insights from Mouser electronics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/","og_locale":"en_US","og_type":"article","og_title":"This is How Mathematics Keeps Your IoT Device Safe","og_description":"Discover more about algorithms and devices for maximising IoT security in this guide with insights from Mouser electronics.","og_url":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2023-01-26T08:00:00+00:00","article_modified_time":"2023-06-19T14:54:39+00:00","og_image":[{"width":1365,"height":768,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg","type":"image\/jpeg"}],"author":"Norman Di Palo","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Norman Di Palo","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/"},"author":{"name":"Norman Di Palo","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/55131e26e4c59236d55c04a6bb1363d0"},"headline":"This is How Mathematics Keeps Your IoT Device Safe","datePublished":"2023-01-26T08:00:00+00:00","dateModified":"2023-06-19T14:54:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/"},"wordCount":1583,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg","keywords":["Cybersecurity"],"articleSection":["IoT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/","url":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/","name":"The Role of Mathematics in IoT Security - Codemotion Magazine","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg","datePublished":"2023-01-26T08:00:00+00:00","dateModified":"2023-06-19T14:54:39+00:00","description":"Discover more about algorithms and devices for maximising IoT security in this guide with insights from Mouser electronics.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg","width":1365,"height":768,"caption":"Cyber security concept. Encryption. Data protection. Anti virus software. Communication network."},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/iot\/this-is-how-mathematics-keeps-your-iot-device-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Backend","item":"https:\/\/www.codemotion.com\/magazine\/backend\/"},{"@type":"ListItem","position":3,"name":"IoT","item":"https:\/\/www.codemotion.com\/magazine\/backend\/iot\/"},{"@type":"ListItem","position":4,"name":"This is How Mathematics Keeps Your IoT Device Safe"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/55131e26e4c59236d55c04a6bb1363d0","name":"Norman Di Palo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/03\/norman-di-palo-100x100.jpeg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/03\/norman-di-palo-100x100.jpeg","caption":"Norman Di Palo"},"description":"My name is Norman Di Palo, I\u2019m a Robotics and Artificial Intelligence student, researcher and consultant from Rome, Italy. I'm a public speaker and I've given several talks at tech events. I am founder and consultant for startups in Rome and Palo Alto. I write about my work and research on my blog, that is read by tens of thousands of people. I mostly enjoy robotics, deep learning, design, vinyls, and good coffee.","url":"https:\/\/www.codemotion.com\/magazine\/author\/norman-di-palo\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-600x600.jpg","author_info":{"display_name":"Norman Di Palo","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/norman-di-palo\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg",1365,768,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-300x169.jpg",300,169,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-768x432.jpg",768,432,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg",1365,768,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg",1365,768,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207.jpg",100,56,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2023\/01\/iStock-1319188207-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Norman Di Palo","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/norman-di-palo\/"},"uagb_comment_info":0,"uagb_excerpt":"The Internet of Things (IoT) is a paradigm expected to bring about a new era of connectedness and collaboration, and is already revolutionizing the way we live and work. However, it comes with a number of new security challenges. Because IoT devices are often connected to sensitive data and systems, they can be attractive targets&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/20019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=20019"}],"version-history":[{"count":8,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/20019\/revisions"}],"predecessor-version":[{"id":21471,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/20019\/revisions\/21471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/20028"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=20019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=20019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=20019"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=20019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}