Tamper detection technologies enable a device to detect and initiate appropriate defensive actions against active attempts to compromise the device integrity or the data associated with the device. The tamper detection design can be implemented to sense different types of tampering, depending on the anticipated threats and risks. The solutions used for tamper detection typically include a suite of sensors specialized on a single threat type together with an alert mechanism, which can be audible or sent to a monitoring system. Typical threat types include physical penetration, hot or cold temperature extremes, input voltage variations, input frequency variations, and x-rays.
The great promise of new connected concepts of industry like 'Industry 4.0' is their ability to deliver a historically unparalleled level of responsiveness and flexibility. While modern supply chains are already heavily integrated and designed to be fluid and fast moving, a large swathe of manufacturing still remains beholden to economies of scale, large production runs, and careful preplanning.The Industrial Internet of Things (IIoT) is set to change this by allowing small-batch or even custom manufacturing on a truly industrial scale. With machines whose functions are not set in stone, but flexible and determined by their operating software and with a new form of connectivity bringing industrial engineers, product manufacturers, and end users closer together than ever before. Ad-hoc adjustments to automotive parts, for example, during active product runs or the bespoke manufacturing of custom sneakers become very viable options indeed.Much of this remains a theoretical vision, but IUNO, the German national reference project for IT security in Industry 4.0 demonstrates the new capabilities in action with a secure technology data marketplace running a smart drinks mixer.
Years of research and development were invested by the company into their biometric sensor technology. They wanted to ensure that their unique, patented intellectual property (IP) was not compromised or cloned through application attacks, such as reverse-engineering or code tampering. This was particularly important given the increased competitive pressures in the wearables market and the customer’s distribution model of working in partnership with consumer product manufacturers and potentially third party developers. Although patented and protected under NDA, the company’s code and IP could potentially be exposed during the sharing of their technology (in the form of an SDK/library) during integration as partners work to turn their wearable products into biometric wearables. The customer also required ease of use and flexibility such that their proprietary technology could first be easily protected and then be leveraged within another 3rd party application. As such, the solution needed to meet stringent resource consumption requirements of diverse mobile / IoT platforms.