1-112Gbps Medium Reach (MR) and Very Short Reach (VSR) SerDes
How to achieve better IoT security in Wi-Fi modules
By Chris Jones, Crypto Quantique
embedded.com (May 26, 2022)
Within industrial IoT deployments, wireless technologies (excluding low power) can be broadly classified as cellular or short-range wireless. Short-range wireless encompasses Wi-Fi, Bluetooth, Zigbee and various other protocols.
Rather than design wireless communications circuits from scratch, embedded system designers often decide to use ready-made and certified wireless modules. Some of these now accommodate a variety of frequencies and protocols within a single module. This article discusses the architecture of Wi-Fi modules and the opportunities for designers to improve IoT device and network security by using the resources available in such modules. In practice, the same general approach may be applied to other modules, regardless of the wireless protocols involved.
What is a Wi-Fi module?
A Wi-Fi module comprises a wireless transceiver for 2.4GHz or 5GHz bands (or both), an antenna, and a microcontroller to run firmware, enable the radio to receive and transmit data, and operate protocols. The external interface to the microcontroller will usually be SPI, I2C, USB or a UART.
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |
|
Related Articles
- How PUF-based RoT Can Solve IoT Security Issues
- Basics of SRAM PUF and how to deploy it for IoT security
- IoT Security: Exploring Risks and Countermeasures Across Industries
- How Low Can You Go? Pushing the Limits of Transistors - Deep Low Voltage Enablement of Embedded Memories and Logic Libraries to Achieve Extreme Low Power
- A comparison of SRAM vs quantum-derived semiconductor PUFs
New Articles
- Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor
- Mastering Key Technologies to Realize the Dream - M31 IP Integration Services
- Create high-performance SoCs using network-on-chip IP
- IoT Security: Exploring Risks and Countermeasures Across Industries
- How Efinix is Conquering the Hurdle of Hardware Acceleration for Devices at the Edge
Most Popular
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- Dynamic Memory Allocation and Fragmentation in C and C++
- System Verilog Assertions Simplified
- Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor
- Design Rule Checks (DRC) - A Practical View for 28nm Technology