{"id":8221,"date":"2022-03-09T00:00:00","date_gmt":"2022-03-09T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/09-03-2022\/low-energy-security-chip-architecture\/"},"modified":"2025-09-11T18:39:04","modified_gmt":"2025-09-11T13:09:04","slug":"low-energy-security-chip-architecture","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/09-03-2022\/low-energy-security-chip-architecture","title":{"rendered":"Low-energy Security Chip Architecture"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>In News<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Recently, two Indian researchers working at the Massachusetts Institute of Technology (MIT), have built a low-energy security chip.<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>About\u00a0<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It is designed to prevent side-channel attacks (SCAs) on <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>IoT (Internet of Things) devices.\u00a0<\/strong><\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Side Channel Attacks (SCAs)<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>About:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">SCAs take advantage of security exploits where information can be gathered from the indirect effects of the functioning of the system hardware rather than attacking a programme or software directly.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Usage:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Traditionally, SCAs have been used in <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>cryptography<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">If some data is being processed and there is a secret key used to encrypt or decrypt it, SCAs could be used in some cases to recover this key.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It can be applied to any data that you want to keep secret.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">For example, it can be used on smartwatches to extract ECG and heart rate signals of the user.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Aim of such attacks:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">These attacks aim to extract sensitive information like:\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">cryptographic keys,\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">proprietary machine learning models and parameters\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Process:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It is done by measuring things like timing information, power consumption and electromagnetic leaks of a system.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Logic:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">SCA uses other auxiliary information to check on the original problem.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">SCA uses the information from the execution of an act to determine what is happening rather than looking at the act itself.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>What attacks use side channel analysis?<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">There are a growing number of known side-channel attack vectors. Some of the most common attacks are:<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Timing attack:<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Analyzes the time a system spends executing cryptographic algorithms.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Electromagnetic (EM) attack:<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Measures and performs a signal analysis on the electromagnetic radiation emitted from a device.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Simple power analysis (SPA):<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Directly observes the power and electromagnetic (EM) variations of a cryptographic system during operations.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Differential power analysis (DPA):<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Obtains and analyzes detailed statistical measurements across multiple operations.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Template attack:<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Recovers cryptographic keys by exploiting an identical \u201ctemplate\u201d device and comparing side-channel data.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Low Energy Chip Architecture<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Characteristics:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The chip is smaller than the size of a thumbnail.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It uses much less power than traditional security measures against SCAs.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It has been built to be easily incorporated into smartwatches, tablets, and a variety of other devices.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Usage:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It can be used in any sensor node which connects user data.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Method:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The chip uses <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>near-threshold computing<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, a computing method where the data to be worked on is first split into separate, unique and random components.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The chip then conducts operations separately on each component in a random order before aggregating the results for a final result.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Scope of improvement:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Even though SCAs are difficult to execute on most modern systems, some developments\u00a0 are making SCAs more of a reality:\u00a0<\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The increasing sophistication of machine learning algorithms,\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Greater computing power of devices and\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Measuring devices with increasing sensitivities<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Improvements by New Research:\u00a0<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>About:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">These researchers from MIT found a way to optimise this process to reduce some of the computational overheads.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Claim:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The researchers claim they have reduced the required computing overheads by three orders of magnitude with their chip architecture.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Problem:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Power intensive:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The implementation of this chip architecture in a system would require at least a five-fold increase in energy consumption 1.6 times the silicon area of an insecure implementation.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Limited protection:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The architecture only protects against energy consumption-based SCAs and doesn\u2019t defend against electromagnetic SCAs.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Storage:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Requiring more system memory to store information.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Advantage:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>More secure:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Due to this method, the information leak from the device through power-consumption measurements are random and would reveal nothing but gibberish in an SCA.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: circle;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>User friendly:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type: square;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It can be used in any sensor node which connects user data.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>Way Ahead<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The Research and Development in this sector should not reduce its pace until a solution is reached which caters to all the existing problems.<\/span><\/span><\/span><\/li>\n<\/ul>\n<div>\n<table style=\"border-collapse: collapse; border: none; table-layout: fixed; width: 624px;\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td style=\"background-color: #ffe599; vertical-align: top; border: 1px solid #000000;\">\n<p style=\"text-align: justify;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>What is Internet Of Things (IoT)?\u00a0<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It is a concept that describes the idea of everyday physical objects being connected to the internet. In the Internet of Things, the connected devices should be able to identify themselves to other devices.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS), microservices and the internet.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">Over 30 billion \u2018smart\u2019 devices will be connected by 2020. That\u2019s equivalent to every single person on this planet with four connected devices and IoT will help in boosting global economies, improving public utilities, and increasing efficiencies.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">It can be utilised in daily life, agri-sector, healthcare, transportation, implementation of policies and monitoring etc.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong><u>IoT in India:<\/u><\/strong><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The Indian government has outlined a plan to leverage IoT as part of the <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Digital India mission<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> and the <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>National Digital Communications Policy<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"> has come out with a machine-to-machine (M2M) roadmap, with an aim to put regulators, industry agencies that develop standards, users and manufacturers on the same page.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">According to Nasscom, the Indian IoT market is expected to reach $15 billion by 2020 and constitute 5 % of the global market.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type: disc;\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">The demand for Satcom is further accentuated by the exploding data demand due to <\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>IoT, 5G, Industry 4.0, Digital India, smart cities<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">, etc.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><span style=\"font-size: 13pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\"><strong>Source<\/strong><\/span><\/span><\/span><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #000000;\">: <\/span><\/span><\/span><a style=\"text-decoration: none;\" href=\"https:\/\/indianexpress.com\/article\/technology\/science\/indian-researchers-develop-low-energy-chip-architecture-prevent-attacks-iot-devices-7803340\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 12pt;\"><span style=\"font-family: 'Book Antiqua',serif;\"><span style=\"color: #1155cc;\">IE<\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In News Recently, two Indian researchers working at the Massachusetts Institute of Technology (MIT), have built a low-energy security chip. About\u00a0 It is designed to prevent side-channel attacks (SCAs) on IoT (Internet of Things) devices.\u00a0 Side Channel Attacks (SCAs) About:\u00a0 SCAs take advantage of security exploits where information can be gathered from the indirect effects [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8222,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[26,102],"class_list":["post-8221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current-affairs","tag-gs-3","tag-information-technology"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/07\/7529327Screenshot_6.png","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/8221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=8221"}],"version-history":[{"count":1,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/8221\/revisions"}],"predecessor-version":[{"id":53774,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/8221\/revisions\/53774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/8222"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=8221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=8221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=8221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}