Wednesday, December 7, 2016

// // Leave a Comment

EEMBC Announces New Benchmark To Target IoT Security Functions

The Embedded Microprocessor Benchmark Consortium, EEMBC, has announced a new benchmark to ensure optimum efficiency of security implementations in IoT devices.

EEMBC announces new benchmark to target IoT security functions

Currently at a development stage within the EEMBC’s IoT Security working group, the benchmark is said to provide an industry-created and standardised tool for application developers to quickly, accurately, and equitably compare the performance and energy efficiency of security solutions targeted at IoT end-point applications.

The benchmark will be rolled out in phases. The first phase is planned for beta release in the first quarter of 2017; this will include tests to evaluate various standalone security functions such as the SHA256, AES, and ECC. The benchmark will enable EEMBC members to implement these algorithms on their microcontrollers using software libraries or hardware accelerators, whichever yields the best-in-class balance of performance, energy, and cost.

The EEMBC IoT Security benchmark will complement the EEMBC Connect benchmark, which is also in the development phase. The EEMBC Connect benchmark is built to reliably determine the combined energy consumption of a system, taking into consideration the real-world effects of sensor inputs and communication (e.g. Bluetooth, Wi-Fi). Current active working group members include Analog Devices, ARM, C-Sky Microsystems, Flex, Intel, Microchip, Nordic Semiconductor, NXP, Redpine Signals, Renesas, Silicon Labs, STMicroelectronics, Synopsys, and Texas Instruments.

Markus Levy, president of EEMBC, said: “Security is a priority of application developers, though they are typically concerned that implementing security functions within their IoT devices will hurt performance and lower battery life. Therefore, a critical goal of our new benchmark will be to quantify the latency and energy impact of implementing security to allow developers to select the optimal combination of microcontroller, hardware, and/or software security products for their application.”

Source: IoTTech

0 comments:

Post a Comment


DISCLAIMER: Opinions expressed in comments are those of the comment writers alone and does not reflect or represent the views of the post author. We reserve the right to delete any post deemed inappropriate or offensive and/or spammy. Please do not use abusive words/hate speech.

I Appreciate your valuable Feedback. So, Please DO NOT SPAM - Spam comments will be deleted immediately.

Don't use brand name in name field and you're not allowed to use links in comments unless it's necessary. Such comments will be removed immediately. To get notified of replies or follow-up comments, click the box next to notify me.

Thanks.