Automation News: Issue 1

ROBOTICS

Analog Devices ADI goes beyond being a mere vendor of turnkey security ICs like the MAXQ1065 and DS28S60 - we empower customers to fulfil diverse security requirements in the robotics industry. By integrating extensive expertise in security and robotics, ADI emerges as a solution provider capable of tackling the distinctive challenges involved in securing robotic systems. Profoundly acquainted with these domains, we enable customers to construct solutions that encompass hardware, software, and system-level considerations. Recognising that security in robotic systems requires a comprehensive approach, ADI goes beyond component-level offerings and adopts a system-level perspective. We consider factors such as hardware, software, communication, and integration, ensuring all critical components are seamlessly integrated. ADI’s collaboration with the automotive industry is exemplified by its wireless battery management system (wBMS), showcasing its capabilities in implementing robust security measures. Through close collaboration

• Secure authentication: integration of secure authenticators to verify device/component identity • Secure coprocessors: utilisation of dedicated hardware for secure storage and cryptographic operations • Secure communication: implementation of encrypted protocols for protected data exchange • Access control: enforcement of granular permissions to restrict unauthorised system access measures: incorporation of measures to protect against physical tampering • Physical security Turnkey security ICs, such as secure authenticators and coprocessors, are purpose-built to meet these requirements, offering ease of implementation and cost efficiency. These fixed-function ICs are complemented by comprehensive software stacks designed for host processors. Note: using a discrete secure element enhances system resilience by preventing a compromised application processor from accessing credentials

stored in a separate IC (isolation). In addition to these aspects, system developers must adopt a structured approach to secure development that encompasses requirements gathering, threat modelling, secure design, implementation, testing, certification, and maintenance. Following a secure development life cycle (SDL) ensures security is built into the development process from the beginning. A sample use case in a robot joint controller A potential system design of a robotic joint control system within a robotic joint is illustrated in Figure 3. In this design, the potential application of the MAXQ1065 becomes apparent as it enables the implementation of secure boot functionality, thereby enhancing the overall security of the system. The MAXQ1065 also encompasses an array of additional features, such as secure key storage, secure communication protocols, and cryptographic operations. Subsequent articles will delve deeper into these use cases and explore their practical applications.

protect against threats. By prioritising cybersecurity and leveraging ADI’s expertise, we can unlock the full potential of robotics while safeguarding against emerging risks in an interconnected world. References 1. Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, and Ali Chehab. “Robotics Cyber Security: Vulnerabilities, Attacks, Countermeasures, and Recommendations.” International Journal of Information Security, March 2021. 2. Christophe Tremlet. “The IEC 62443 Series of Standards: How to Defend Against Infrastructure Cyberattacks.” Analog Devices, April 2023. Author biography: Manoj Rajashekaraiah is a principal engineer specialising in software systems design within the Security Business Unit at Analog Devices. With a strong focus on embedded device security, he excels in creating safety, security, and sensor software for automotive and IoT applications. Manoj is a seasoned presenter and blogger with a passion for sharing knowledge, having shared his insights at conferences like IEEE INIS and VDA Automotive SYS. He is a published author on embedded.com and regularly delivers talks at institutes in Karnataka. Manoj holds a Master’s Degree in embedded systems from BITS Pilani, India.

Figure 3

with customers, ADI has developed a fully safe and secure ISO 21434-certified wBMS system. Encouraging similar collaborative efforts within the robotics industry would leverage ADI’s expertise in security implementation. By partnering closely with stakeholders, ADI can contribute to the development of safe and secure robotics systems, drawing from its experience and success in the automotive sector. With its capabilities and dedication to security, ADI emerges as the preferred partner for system design, offering unparalleled expertise and support in all cybersecurity-related endeavours. To learn more: • Engage with the embedded security community by joining discussions on security- related blogs at EngineerZone. Search for “security” to find valuable articles and resources dedicated to the topic. Contribute to

the ongoing dialogue by sharing insights, asking questions, and participating actively • Explore our range of security products and gain valuable insights at Embedded Security and 1-Wire. Access recent technical articles, application notes, and videos to enhance your understanding of the subject. Stay up to date with the latest advancements in the field and discover more about our security offerings • Look at how security takes the spotlight in the ADI wBMS system in the Analog Dialogue article ‘In the New Era of Wireless Battery Management Systems (wBMS), Security Takes the Spotlight’ Conclusion In securing the future of robotics, cybersecurity is paramount. Robust measures, such as secure authentication, encrypted communication, and supply chain security are crucial to

26

27

Powered by