Realize Autonomous Security for IoT Edge Devices With RX231 Security Solution

Product Information

Security in the IoT Era

It is now the era of the Internet of Things (IoT), where not only information terminals, but all sorts of devices, from home appliances to industrial equipment, are networked. Networked edge devices enjoy the benefits of the network while at the same time being exposed to the threat of illegal access by external sources.

In order to protect the system, intellectual property, and private information associated with an edge device from threats, the edge device itself requires strong security that enables it to autonomously protect itself from threats. Advanced technical knowledge and a device that has advanced security features are necessary for satisfying these requirements.

RX231 Security Solution

The RX231 security solution is the answer to these issues.

  • The RX231 is a general-purpose microcontroller, but is also equipped with trusted secure IP that can ensure very strong security (Feature #1).
  • The RX231 communications security evaluation kit makes it easy even for first-time users to implement security with the RX231 (Feature #2).
Featured 1:

Trusted Secure IP

Robust key management, encrypted communication, and tampering detection ensures strong security against threats such as reverse engineering, eavesdropping, and viruses.

Figure 1. Threats in the IoT era and RX231 security

Figure 1. Threats in the IoT era and RX231 security

Robust key management: The encryption key is associated with an ID unique to each chip and saved as indecipherable key generation information. Once a chip has shipped, the encryption key is never exposed outside the trusted secure IP. (Very important, as security will completely fail if the encryption key were to leak)

Figure 2. Trusted secure IP provides robust key management

Figure 2. Trusted secure IP provides robust key management

The encryption engine supports AES for encrypted communication. CMAC, CCM, etc. used for ECB, CBC, GCM, and authentication and tampering detection are supported as modes that use AES encryption.

Software that utilizes secure firmware updating and secure boot trusted secure IP protects against threats of illegal program modification or execution by detecting attempts to tamper with programming via communication routes such as Wi-Fi or USB

* For details on 2 and 3, see the materials introducing trusted secure IP at the bottom of this page.

Featured 2:

Ease of Implementation

The RX231 communications security evaluation kit makes it easy even for first-time users to implement robust security in a short time.

Example implementation timeline using RX231 communications security evaluation kit

Figure 3. Example implementation timeline using RX231 communications security evaluation kit

Details on Trusted Secure IP here! Includes Information on the Secure Firmware Updating Mechanism that Detects Tampering

Details on trusted secure IP

Register to My Renesas to download materials about trusted secure IP and to continue to receive the latest information as it comes out.

Register to My Renesas here