CABA Information Series

IS-2003-29: The Inside Story: Embedded Security for Constrained Devices

Security has become an undeniable requirement for wireless and other constrained devices. Fast on the heels of consumer uptake, corporations and government organizations are making wireless technology part of their daily lives — using it to handle private and sometimes sensitive information. This paper, the first in a series of 3 wireless security white papers from Certicom presents reasons why security should be embedded in the hardware design of wireless devices, rather than added on to existing devices. Standard security protocols are preferred over proprietary methods.


(Adobe PDF File)