Embeddedadvisor
US
APAC
EUROPE
  • Home
  • Insights
  • Whitepaper
  • Conferences
  • Newsletter
  • Subscribe
  • News
  • About us
Go to...
  • Home
  • Insights
  • Whitepaper
  • Conferences
  • Newsletter
  • Subscribe
  • News
  • About us
  • Categories

  • IP Design
  • Telecom
  • Wearables and Sensor
  • Consumer Electronics
  • IoT
  • More
      • Industrial Computing
Go to...
  • Categories

  • IP Design
  • Telecom
  • Wearables/Sensor
  • Consumer Electronics
  • IoT
  • Industrial Computing
×
#

Embedded Advisor Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Embedded Advisor

Subscribe

loading

THANK YOU FOR SUBSCRIBING

  • Home
  • Insights
  • PCB Design and Engineering
Editor's Pick(1 - 4 of 8)
left
ECM - Ease of Storage is the New Challenge

Douglas Duncan, CIO, Columbia Insurance Group

The Inflight Connectivity Conundrum

Chris Moore, Former EVP & CIO, Sun Country Airlines and CIO Consultant, Freelance Consulting

Telecom's Top 6 Trends: What You Should Know

Cam Ewoldt, Manager, Transport Networks, Great Plains Communications

What's New in PCB Design? Time to Explore the Low End of the EDA Tool Market written for Embedded Advisor

Randall Restle, Digi-Key Electronics Vice President, Applications Engineering

The Growing Importance of Supply Chain Collaboration in Life Science

Gustavo Salem, Group President, IDEX Health & Science LLC

Chained to Your Desk? Not Anymore, Thanks to Workplace Technology

Mike Marusic, COO, Sharp Electronics Corporation [TYO:6753]

Critical Infrastructure Cyber Protection: Stronger Deterrence Helps but Isolation and Mitigation Are Essential

Bruce J. Heiman, Partner ‑ Public Policy and Law, K&L Gates

Next Generation MFPs

Matt Smith, VP, Printing Solutions, Samsung Electronics America

right

Hiding in Plain Sight: The DNA Molecule as Next-Generation Cyber-Physical Network Security

By Judy Murrah, CIO, Applied DNA Sciences Inc

Tweet

Judy Murrah, CIO, Applied DNA Sciences Inc

The ultimate challenge: network security. Connected but access-protected. Open standards but private keys. Locked-down but useable. Collaborative but intrusion-protected. From devices to supply chains. Where to begin?

Software security has been a hot topic ever since the first computer virus, named “Creeper”, was detected back in 1971 and Fred Cohen coined the term in 1983. Since then, the software security industry has steadily grown to $20 billion in revenue in 2014. On the other hand, hardware-level security has been the laggard, maybe even overlooked, as the focus traditionally has been on facility-level security rather than the hardware components themselves.

Recently, the advent of smart connected devices within the Internet of Things, 3D printing and easy transportability of computer designs, among others, has accelerated the need for hardware security paired with software security in network devices. Hardware and software protection are synergistic and interdependent--the yin and the yang.

Unfortunately, our society today has a dark side that intensifies the urgency to integrate them for 360-degree security as we cross the globally competing interests of cultures, governments and businesses. Hardware and software tampering has become the “big business” of counterfeiting and diversion in our world of global supply chains and contract manufacturing, large-scale software-driven critical infrastructure for electricity and transportation, and the necessity of maintaining longer product lifecycles in military defense.

" Acting as an invisible identifier “hiding in plain sight”, it is ready for authentication at any step of the supply chain"

Cyber-physical security is born. While the term “cyber-physical systems” was first used in 2006 as an acknowledgement of the interdependencies of hardware and software, it was only on June 30, 2014 that NIST convened the first meeting of the Cyber-Physical Working Group to drive standards and interoperability through a world of multi-vendor, globally deployed products and systems.

While much focus is placed on protecting the perimeter of a network, newer technologies are now available to protect the devices of our networks based on traceability, tamper-evidence and authenticity. The building block of the concept is the creation and encryption of forensic DNA molecular codes attached to or embedded within the hardware itself. Acting as an invisible identifier “hiding in plain sight”, it is ready for authentication at any step of the supply chain. The hardware layer, in effect, becomes the first line of defense to the software.

As the marked component becomes part of a circuit board, and the circuit board becomes part of a navigation system, and the navigation system becomes part of a complete fighter plane, the DNA of each part is referenced to the others and the software stored in a database for future audit. In effect, this multi-factor identity can be thought of as a “system genome” which can be authenticated physically “CSI-like” as it travels through its networked supply chain and into the field of use. 

This Identity of Things (IDoT) technology is field-proven in marking more than 100 million pounds of U.S. cotton, more than a half-million military electronics parts, more than one million personal assets and autos, and commercial-grade batches of plastic, silicone, print media, cash-staining inks and more.

To establish its place in a network, in the vernacular of the OSI and TCP/IP network stack models, we can loosely describe:

• the physical and data-link layers as the DNA, encoded and encrypted to standards and used for traceability
• the transport layer as the item itself, whether it is labeled, inked or even embed­ded with DNA
• the presentation and application layers as the de­vices and software used for the series of validations and authentications of a given item or sys­tem, including the addition of test and trace documentation, reference­able throughout its supply chain or lifecycle.

Drilling down into the “data layer” is the use of DNA as an information carrier. Continuing the trajectory of increasing information capacity from one-dimensional to two-dimensional bar coding, DNA can be thought of as a three-dimensional code carrier with higher density and capacity. Where the binary digital world offers “0” or “1” for each bit with eight bits to a byte, DNA offers four “states” for each “bit”. Each DNA “bit” is represented by combinations of its four nucleobases adenine, thymine, cytosine and guanine (shortened to A-T-C-G). Using one “byte” (or eight bases) of data as a sample comparison, the number of codes that can be generated is 28 = 256 for digital or 48 = 65,536 for DNA.

At the “transport layer”, the device carries its own security by overtly marking or covertly embedding every device with a traceable DNA identity or message for traceability. Synchronizing the hardware DNA code to a software program key provides cyber-physical security at any time during the lifecycle. Physical security can be heightened by using an encrypted DNA compound in sealed seams or fasteners that become visible when broken. Evidence of physical tampering is an excellent early warning for software tampering before it is too late. Should the items be stolen, the forensic ID will be able to trace them back to their rightful owner.

The “presentation layer” of this model is formed by the readers that capture, translate and store the information in a way that enables users to validate and authenticate the products traveling through its networked supply chain within a common, trusted software application platform. This embodies an axiom of collaboration: trust is value, and authentication is its currency. It should be shared and protected by all.

The cyber-physical security concepts described here are lifelines to our pop­ulation. At the net­work level are applianc­es such as routers, servers, PC’s, laptops and even mobile phones. At a supply chain level are the electronics and systems underpinnings of military aircraft. At a national infrastructure level are the miles of electrical cabling and railroad tracks. In the end, it doesn’t re­ally matter where you begin. All it takes is one weak link

Read Also

The Growing Importance of Supply Chain Collaboration in Life Science

The Growing Importance of Supply Chain Collaboration in Life Science

Gustavo Salem, Group President, IDEX Health & Science LLC
Chained to Your Desk? Not Anymore, Thanks to Workplace Technology

Chained to Your Desk? Not Anymore, Thanks to Workplace Technology

Mike Marusic, COO, Sharp Electronics Corporation [TYO:6753]
Critical Infrastructure Cyber Protection: Stronger Deterrence Helps but Isolation and Mitigation Are Essential

Critical Infrastructure Cyber Protection: Stronger Deterrence Helps but Isolation and Mitigation Are Essential

Bruce J. Heiman, Partner ‑ Public Policy and Law, K&L Gates
Next Generation MFPs

Next Generation MFPs

Matt Smith, VP, Printing Solutions, Samsung Electronics America

Weekly Brief

loading
Top 10 PCB Design and Engineering Solution Companies - 2019

PCB Design and Engineering Special

Featured Vendors

  • ACS Design: Simple, Elegant Electronic Designs
    ACS Design: Simple, Elegant Electronic Designs
  • DISHER: Creating a Positive Ripple in the PCB Industry
    DISHER: Creating a Positive Ripple in the PCB Industry
  • PARPRO: A One-Stop Shop for Design in Manufacturing
    PARPRO: A One-Stop Shop for Design in Manufacturing
  • Sunstone Circuits: Redefining Customer-Centricity in the PCB Landscape
    Sunstone Circuits: Redefining Customer-Centricity in the PCB Landscape

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 Embedded Advisor. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy.
follow on linkedin follow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

pcb-design-and-engineering.embeddedadvisor.com/cioviewpoints/hiding-in-plain-sight-the-dna-molecule-as-nextgeneration-cyberphysical-network-security-nid-180.html?utm_source=google&utm_campaign=embeddedadvisor_topslider