Most of the IoT devices out in the market today fail in terms of hardware security, that is, protecting access to the hardware from attackers. Be it an IP camera, baby monitor, medical device, enterprise IoT, smart wearables, or smart TVs, as soon as you start looking at its security, there is a high likelihood that a moderately skilled attacker would be able to open up the device (thanks to no/little protection against opening up the device), read the various chips, identify datasheets for them (due to missing protection for hiding the identities of chips), get access to the data in the chip (when there is no protection against getting access to the chips), interact with the device over various interfaces (because there is no protection against exposed interfaces), and more.
In this chapter, we will cover the various steps, which device developers and manufacturers can take to secure the embedded device hardware used in IoT devices. Even though making a device 100% secure is...