Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

IoT Security

New Samsung Exynos Chip Secures IoT Devices With Short-Range Comms

Samsung Exynos i T100

Samsung this week unveiled Exynos i T100, a new mobile system-on-chip (SoC) designed to enhance the security and reliability of Internet-of-Things (IoT) devices that use short-range communication protocols.

Samsung Exynos i T100

Samsung this week unveiled Exynos i T100, a new mobile system-on-chip (SoC) designed to enhance the security and reliability of Internet-of-Things (IoT) devices that use short-range communication protocols.

The new product, which is currently sampling, is advertised as ideal for devices used to automate and control environments in homes and businesses (e.g., temperature control, smart lighting, fire and gas detection, and physical security systems), and fitness wearables.

Samsung says the new chip, which uses power-efficient 28nm technology, supports the Bluetooth Low Energy (BLE) 5.0 and Zigbee 3.0 protocols, and it integrates the processor with memory in an effort to provide flexibility to device manufacturers.

According to Samsung, the security features integrated into the new chip are designed to protect IoT devices against hacking attempts and other threats.

“The Exynos i T100 comes with a separate Security Sub-System (SSS) hardware block for data encryption and a Physical Unclonable Function (PUF) that creates a unique identity for each chipset,” the tech giant said.

As for reliability, the Exynos i T100 is designed to work in temperatures ranging between -40°C (-40°F) and 125°C (257°F).

Samsung previously released Exynos i T200 processors for devices using Wi-Fi and Exynos i S111 for devices using long-range narrow-band (NB) communications.

Related: New AMD Processors to Include Protections for Spectre-like Exploits

Advertisement. Scroll to continue reading.

Related: Intel Adds Hardware Shield to New 8th Gen Intel Core vPro Mobile CPUs

Related: New Mirai Variant Targets More Processor Architectures

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.

IoT Security

An innocent-looking portable speaker can hide a hacking device that launches CAN injection attacks, which have been used to steal cars.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

ICS/OT

As smart cities evolve with more and more integrated connected services, cybersecurity concerns will increase dramatically.