January Circuit Cellar: Sneak Preview

Happy New Years! The January issue of Circuit Cellar magazine is coming soon. Don’t miss this first issue of Circuit Cellar’s 2019 year. Enjoy pages and pages of great, in-depth embedded electronics articles produced and collected for you to enjoy.

Not a Circuit Cellar subscriber?  Don’t be left out! Sign up today:

 

Here’s a sneak preview of January 2019 Circuit Cellar:

TRENDS & CHOICES IN EMBEDDED COMPUTING

Comms and Control for Drones
Consumer and commercial drones represent one of the most dynamic areas of embedded design today. Chip, board and system suppliers are offering improved ways for drones to do more processing on board the drone, while also providing solutions for implementing the control and communication subsystems in drones. This article by Circuit Cellar’s Editor-in-Chief Jeff Child looks at the technology and products available today that are advancing the capabilities of today’s drones.

Choosing an MPU/MCU for Industrial Design
As MCU performance and functionality improve, the traditional boundaries between MCUs and microprocessor units (MPUs) have become less clear. In this article, Microchip Technology’s Jacko Wilbrink examines the changing landscape in MPU vs. MCU capabilities, OS implications and the specifics of new SiP and SOM approaches for simplifying higher-performance computing requirements in industrial applications.

Product Focus: COM Express Boards
The COM Express architecture has found a solid and growing foothold in embedded systems. COM Express boards provide a complete computing core that can be upgraded when needed, leaving the application-specific I/O on the baseboard. This Product Focus section updates readers on this technology and provides a product album of representative COM Express products.

MICROCONTROLLERS ARE DOING EVERYTHING

Connecting USB to Simple MCUs
Sometimes you want to connect a USB device such as a flash drive to a simple microcontroller. Problem is most MCUs cannot function as a USB host. In this article, Stuart Ball steps through the technology and device choices that solve this challenge. He also puts the idea into action via a project that provides this functionality.

Vision System Enables Overlaid Images
In this project article, learn how these Cornell students Daniel Edens and Elise Weir designed a system to overlay images from a visible light camera and an infrared camera. They use software running on a PIC32 MCU to interface the two types of cameras. The MCU does the computation to create the overlaid images, and displays them on an LCD screen.

DATA ACQUISITION AND MEASUREMENT

Data Acquisition Alternatives
While the fundamentals of data acquisition remain the same, its interfacing technology keeps evolving and changing. USB and PCI Express brought data acquisition off the rack, and onto the lab bench top. Today solutions are emerging that leverage Mini PCIe, Thunderbolt and remote web interfacing. Circuit Cellar’s Editor-in-Chief, Jeff Child, dives into the latest technology trends and product developments in data acquisition.

High-Side Current Sensing
Jeff Bachiochi says he likes being able to measure things—for example, being able to measure load current so he can predict how long a battery will last. With that in mind, he recently found a high-side current sensing device, Microchip’s EMC1701. In his article, Jeff takes you through the details of the device and how to make use of it in a battery-based system.

Power Analysis Capture with an MCU
Low-cost microcontrollers integrate many powerful peripherals in them. You can even perform data capture directly to internal memory. In his article, Colin O’Flynn uses the ChipWhisperer-Nano as a case study in how you might use such features which would otherwise require external programmable logic.

TOOLS AND TECHNIQUES FOR EMBEDDED SYSTEM DESIGN

Easing into the IoT Cloud (Part 2)
In Part 1 of this article series Brian Millier examined some of the technologies and services available today enabling you to ease into the IoT cloud. Now, in Part 2, he discusses the hardware features of the Particle IoT modules, as well as the circuitry and program code for the project. He also explores the integration of a Raspberry Pi solution with the Particle cloud infrastructure.

Hierarchical Menus for Touchscreens
In his December article, Aubrey Kagan discussed his efforts to build a display subsystem and GUI for embedded use based on a Noritake touchscreen display. This time he shares how he created a menu system within the constraints of the Noritake graphical display system. He explains how he made good use of Microsoft Excel worksheets as a tool for developing the menu system.

Real Schematics (Part 2)
The first part of this article series on the world of real schematics ended last month with wiring. At high frequencies PCBs suffer from the same parasitic effects as any other type of wiring. You can describe a transmission line as consisting of an infinite number of infinitesimal resistors, inductors and capacitors spread along its entire length. In this article George Novacek looks at real schematics from a transmission line perspective.

Internet of Things Security (Part 6)

Identifying Threats

In this final part of his Internet of Things Security article series, this time Bob returns to his efforts to craft a checklist to help us create more secure IoT devices. This time he looks at developing a checklist to evaluate the threats to an IoT device.

By Bob Japenga

A number of years ago (there were woolly mammoths around if I remember correctly), I attended a conference on the Ada programming language. Ada was created for the United States’ Department of Defense to replace the myriad of programming languages that were deployed by the DoD at that time. The language was named after the first programmer, Augusta Ada King Lovelace, a colorful character in her own right and the only legitimate daughter of the poet Lord Byron. Ada is credited with publishing the first algorithm for use on a computing machine: Charles Babbage’s famous analytical engine.

At the conference I attended a breakout session on algorithms. In the conference room next door, a popular speaker, whose name I don’t remember, held another breakout session. About ten minutes into the session, we heard a deafening chant coming from the conference room next door that repeated over and over: “I don’t care.” The speaker was making a point that, as software designers, we should not care about everything. There are legitimate things for which we need to say: “I don’t care.” We need to identify them as not relevant to the task at hand and emphatically say: “I don’t care.”

Although I remember nothing from the breakout session on algorithms, I have never forgotten this principle: “There are some things that we just don’t care to address when designing embedded systems.” Certainly, there is much to be said for thoroughness in design, but when we—with well thought through analysis—determine that some aspect of a design is a “don’t care” we need to let it go.

In designing secure IoT devices this is a very important principle. The threats are diverse and difficult to number. The assets are important and of differing value. This month we will continue to build our checklist for IoT security. Last time we created a checklist to help you identify the assets that you want to protect. This month we will add to that checklist with some questions to help you identify and quantify the threats.

Identifying the Threats

We need to start with definitions. A good working definition for a threat would be: “a person or thing likely to cause damage or danger.” Although this is a good definition, for the purpose of building our checklist, I want to expand upon it a little. Here’s why: In most cases “I don’t care” who the threat is, nor do I care what their capabilities are. Keep in mind that, if there is a threat with very little capabilities, that threat could get passed on. They can always sell either their knowledge or their access to the device to someone who has the capabilities to create a security breach with the device. Let me illustrate that. Imagine there are two threats: One is a disgruntled former employee with little or no capability of reverse engineering your design in order to find a security flaw. The second is an organization with deep pockets and highly skilled hackers. If any of the assets that we identified in the first part of the checklist are worth a significant chunk of change, the former employee can always sell what they have to this other organization. With all that in mind, in general “I don’t care” about who the threat is.

But I do care about the activities of these threat agents. This is in line with the way the OWASP Top Ten IoT Security Threats is laid out. The Open Web Application Security Project (OWASP) is a worldwide organization focused on improving the security of software. I introduced OWASP as a valuable resource in my August 2016 column (Circuit Cellar 313) when we discussed their list of the top ten security vulnerabilities. The list was updated in 2017 and worthwhile to review [1]. OWASP also provides what its calls the top ten threats to IoT devices. We will look at these a little later in this article. They agree with my assessment that we don’t care who it is or what their capability is. What we care about is the action that they can take.

Figure 1
Shown here are the five areas of threat I’ve identified for IoT devices.

When thinking about threats to the security of our IoT device, I would identify five areas of threat as shown in Figure 1: access to the physical device; access to the wireless services on the device; access to the network (LAN or WAN) the device is on; access to the cloud server used by the device; and access to the mobile app used by the device. Anyone who has access to one or more of these is a threat agent. So, the beginning of our checklist needs to analyze what harm could be done by such a threat agent who gained access to any of these five areas of threat. Not all of your IoT devices have all of these areas of threat but most have a majority of them. For each of the areas of threat we need to ask the question: What would be the potential cost if someone with a lot of time, highly skilled hackers and a lot of money got access to one of these areas of threat without permission?. …

Read the full article in the December 341 issue of Circuit Cellar

Don’t miss out on upcoming issues of Circuit Cellar. Subscribe today!

Note: We’ve made the October 2017 issue of Circuit Cellar available as a free sample issue. In it, you’ll find a rich variety of the kinds of articles and information that exemplify a typical issue of the current magazine.

Secure MCU Family Targets Low Power, Small Footprint Designs

STMicroelectronics has added the new STM32G0 microcontrollers (MCUs) to the STM32 family. The new G0 series targets entry-level applications that require greater energy efficiency, functionality, security, and value, in a smaller footprint. Extremely flexible packaging and memory options enable designers to do more within less space, and save cost. A new power-distribution architecture reduces external power and ground connections to just a single pair of pins, allowing more of the package pins—a precious resource in many embedded projects—to be allocated for user connectivity.

In addition, ST is making large memory densities available in small and economical low-pin-count packages. On top of this, the new generation features power-saving innovations that trim consumption close to that of specialized ultra-low-power devices.

To provide robust security for today’s connected devices, the STM32G0 series introduces a variety of hardware-based features including memory protection to support secure boot. Some devices in the series add to these features an AES-256 hardware cryptographic accelerator with a true random number generator (TRNG) to aid encryption.

Another valuable feature that anticipates a growing need is support for the latest USB Type-C specifications that allow easy, high-speed connectivity and battery charging, including Power Delivery version 3.0.

The STM32G0 series is based on the Arm Cortex-M0+ core, which is conceived to deliver sharp performance within a tight power budget. It targets fast-evolving products in the connected world, including smartphones, smart kitchen equipment, and appliances, air conditioning, consumer or industrial motor controls, advanced user interfaces, IoT devices, rechargeable connected devices, drones, lighting systems and more.

Package options are available from 8-pin, enabling developers to easily upgrade aging 8-bit MCU designs, to 100-pin. Flash from 16 KB to 512 KB, with 512 KB available in packages as small as 32-pin, enables more sophisticated applications on small, low-cost products.

The maximum CPU frequency of 64 MHz permits high execution speeds, compared to typical entry-level MCUs. On the other hand, extremely flexible clock configuration allows users to tailor performance within the available power budget. The internal clock is remarkably stable and comparable to high-end devices, being accurate to within ±1% from 0-85°C and ±2% over the wider range from -40°C to 125°C. This not only saves the board space and pins needed to connect a dedicated external timing device, but also can trim at least 10 cents from the bill of materials.

The STM32G0 series is extremely efficient, running at less than 100µA/MHz in run mode, and provides multiple reduced-power operating modes to save energy and extend battery runtimes. Devices draw as little as 3-8µA in stop mode with the real-time clock (RTC) running, and just 500 nA in standby with RTC (all at 3.0V, 25°C).

Moreover, peripherals are upgraded to enhance performance, speed, and accuracy. The devices feature a 12-bit 2.5 MSPS ADC, with hardware oversampling for 16-bit precision. There is also a 2-channel DAC, fast comparators, and high-accuracy timers with 7.8 ns resolution.

In addition to permitting extra user-assignable I/Os, the internal (ST-patented) power-distribution scheme also helps save BoM costs by reducing the number of external power-supply decoupling components.

Enhanced internal prevention of electromagnetic susceptibility (EMS) is yet another feature that saves board space and BoM costs. Protection against fast-transient bursts above 4.5kV, in accordance with IEC 61000-4-4, relaxes the demands for surrounding filtering components and eases board layout. For product-development teams, the ability to easily ensure good electromagnetic behavior facilitates EMC certifications for faster time to market.

ST is planning several STM32G0 lines, including the STM32G071 and similar STM32G081 with hardware cryptographic enhancement. There are also Value Line STM32G070 devices for mass-market applications. Pricing starts from $0.69 for the STM32G070CBT6 Value Line MCU in a 48-pin package, with 128 KB flash, for orders of 10,000 pieces.

STMicroelectronics | www.st.com

Cypress Semi Teams with Arm for Secure IoT MCU Solution

Cypress Semiconductor has expanded its collaboration with Arm to provide management of IoT edge nodes. The solution integrates the Arm Pelion IoT Platform with Cypress’ low power, dual-core PSoC 6 microcontrollers (MCUs) and CYW4343W Wi-Fi and Bluetooth combo radios. PSoC 6 provides Arm v7-M hardware-based security that adheres to the highest level of device protection defined by the Arm Platform Security Architecture (PSA).
Cypress and Arm demonstrated hardware-secured onboarding and communication through the integration of the dual-core PSoC 6 MCU and Pelion IoT Platform in the Arm booth at Arm TechCon last month. In the demo, the PSoC 6 was running Arm’s PSA-defined Secure Partition Manager to be supported in Arm Mbed OS version 5.11 open-source embedded operating system, which will be available this December. Embedded systems developers can leverage the private key storage and hardware-accelerated cryptography in the PSoC 6 MCU for cryptographically-secured lifecycle management functions, such as over-the-air firmware updates, mutual authentication and device attestation and revocation. According to the company, Cypress is making a strategic push to integrate security into its compute, connect and store portfolio for the IoT.

The PSoC 6 architecture is built on ultra-low-power 40-nm process technology, and the MCUs feature low-power design techniques to extend battery life up to a full week for wearables. The dual-core Arm Cortex-M4 and Cortex-M0+ architecture lets designers optimize for power and performance simultaneously. Using its dual cores combined with configurable memory and peripheral protection units, the PSoC 6 MCU delivers the highest level of protection defined by the Platform Security Architecture (PSA) from Arm.

Designers can use the MCU’s software-defined peripherals to create custom analog front-ends (AFEs) or digital interfaces for innovative system components such as electronic-ink displays. The PSoC 6 MCU features the latest generation of Cypress’ industry-leading CapSense capacitive-sensing technology, enabling modern touch and gesture-based interfaces that are robust and reliable.

Cypress Semiconductor | www.cypress.com

Three Firms Team Up for Industrial IoT Security Effort

IAR Systems, Secure Thingz and Renesas Electronics have announced their collaboration to secure Industrial Internet of Things (IIoT) applications. As part of this collaboration, the companies will develop new solutions that combine IAR Systems’ software development technology, Secure Thingz’ expertise in advanced IoT security, and Renesas Electronics’ secure semiconductor technologies.

Security is an inherent risk when it comes to connected devices. In the Industrial IoT, incoming threats and system vulnerabilities can result in life-threatening or high-risk situations. Therefore, embedded applications in this area require very strong features for security and reliability. To meet these requirements, Secure Thingz’ Embedded Trust, which is a security development environment that leverages the IAR Embedded Workbench IDE from IAR Systems, will support Renesas microcontrollers (MCUs) when Embedded Trust is launched to the broader market in 2019. This new hardware and software solution will enable organizations to secure their systems, intellectual property (IP) and data.

“Despite legislation and new security standards mandating greater protection, the news stories of hacking, theft and counterfeiting still persist. It is now a question of when, and not if, you will be compromised,” says Haydn Povey, CEO, Secure Thingz. “At Secure Thingz, we are collaborating with trusted industry friends to secure the connected world and inhibit these compromises. The collaboration between Secure Thingz, IAR Systems and Renesas will help organizations conquer the security challenges of today and tomorrow.”

“To really deliver on the promise of the IoT, embedded applications will need to include security from start, both in hardware and software,” says Stefan Skarin, CEO, IAR Systems. “IAR Systems’ long-standing collaboration with Renesas has resulted in a number of successful activities and solutions. Now with connected IoT devices all around us and ongoing security threats, we as suppliers need to help our customers in the best way we can. IAR Systems and Secure Thingz are working together to make superior security available for all, and we are pleased to have Renesas with us on this journey.”

“With increased connectivity come greater security risks, and the growing number of connected industrial devices requires a stronger focus on security from the early stages of chip design to protect both the silicon solution and the application from potential security issues,” says Yoshikazu Yokota, Executive Vice President and General Manager of Industrial Solution Business Unit, Renesas Electronics Corporation. “For the past 30 years, our collaboration with IAR Systems has introduced reliable and high-performance solutions that have enabled the creation of innovative embedded designs, and with the addition of Secure Thingz moving forward, we are poised to support the next generation of Industrial IoT design with the security it needs.”

IAR Systems | www.iar.com

Secure Thingz | www.securethingz.com

Renesas Electronics | www.renesas.com

 

 

IoT Door Security System Uses Wi-Fi

Control Via App or Web

Discover how these Cornell students built an Internet-connected door security system with wireless monitoring and control through web and mobile applications. The article discusses the interfacing of a Microchip PIC32 MCU with the Internet, and the application of IoT to a door security system.

By Norman Chen, Ram Vellanki and Giacomo Di Liberto

The idea for an Internet of Things (IoT) door security system came from our desire to grant people remote access to and control over their security system. Connecting the system with the Internet not only improves safety by enabling users to monitor a given entryway remotely, but also allows the system to transmit information about the traffic of the door to the Internet. With these motivations, we designed our system using a Microchip Technology PIC32 microcontroller (MCU) and an Espressif ESP8266 Wi-Fi module to interface a door sensor with the Internet, which gives the user full control over the system via mobile and web applications.

The entire system works in the following way. To start, the PIC32 tells the Wi-Fi module to establish a connection to a TCP socket, which provides fast and reliable communication with the security system’s web server. Once a connection has been established, the PIC32 enters a loop to analyze the distance sensor reading to detect motion in the door. Upon any detection of motion, the PIC32 commands the Wi-Fi module to signal the event to the web server. Each motion detection is saved in memory, and simultaneously the data are sent to the website, which graphs the number of motion detections per unit time. If the security system was armed at the time of motion detection, then the PIC32 will sound the alarm via a piezoelectric speaker from CUI. The alarm system is disarmed at default, so each motion detection is logged in the web application but no sound is played. From both the web and mobile application, the user can arm, disarm and sound the alarm immediately in the case of an emergency.

DESIGN

The PIC32 acts as the hub of the whole system. As shown in Figure 1, each piece of hardware is connected to the MCU, as it detects motion by analyzing distance sensor readings, generates sound for the piezoelectric speaker and commands the Wi-Fi module for actions that pertain to the web server. The distance sensor used in our system is rated to accurately measure distances of only 10 to 80 cm [1]. That’s because motion detection requires us only to measure large changes in distances instead of exact distances, the sensor was sufficient for our needs.

Figure 1
The schematic of the security system. Note that the door sensor runs on 5  V, whereas the rest of the components run on 3.3 V

In our design, the sensor is facing down from the top of the doorway, so the nearest object to the sensor is the floor at idle times, when there is no movement through the door. For an average height of a door, about 200 cm, the sensor outputs a miniscule amount of voltage of less than 0.5 V. If a human of average height, about 160 cm, passes through the doorway, then according to the datasheet [1], the distance sensor will output a sudden spike of about 1.5 V. The code on the PIC32 constantly analyzes the distance sensor readings for such spikes, and interprets an increase and subsequent decrease in voltage as motion through the door. The alarm sound is generated by having the PIC32 repeatedly output a 1,500 Hz wave to the piezoelectric speaker through a DAC. We used the DMA feature on the PIC32 for playing the alarm sound, to allow the MCU to signal the alarm without using an interrupt-service-routine. The alarm sound output therefore, did not interfere with motion detection and receiving commands from the web server.

The Wi-Fi module we used to connect the PIC32 to the Internet is the ESP8266, which has several variations on the market. We chose model number ESP8266-01 for its low cost and small form factor. This model was not breadboard-compatible, but we designed a mount for the device so that it could be plugged into the breadboard without the need for header wires. Figure 2 shows how the device is attached to the breadboard, along with how the rest of the system is connected.

Figure 2
The full system is wired up on a breadboard. The door sensor is at the bottom of the photo, and is attached facing down from the top of a doorway when in use. The device at the top of the figure is the PIC32 MCU mounted on a development board.

The module can boot into two different modes, programming or normal, by configuring the GPIO pins during startup. To boot into programming mode, GPIO0 must be pulled to low, while GPIO2 must be pulled high. To boot into normal mode, both GPIO0 and GPIO2 must be pulled high. Programming mode is used for flashing new firmware onto the device, whereas normal mode enables AT commands over UART on the ESP8266. Because we only needed to enable the AT commands on the module, we kept GPIO0 and GPIO2 floating, which safely and consistently booted the module into normal mode.

SENDING COMMANDS

Before interfacing the PIC32 with the Wi-Fi module, we used a USB-to-TTL serial cable to connect the module to a computer, and tested the functionality of its AT commands by sending it commands from a serial terminal. …

Read the full article in the December 341 issue of Circuit Cellar

Don’t miss out on upcoming issues of Circuit Cellar. Subscribe today!

Note: We’ve made the October 2017 issue of Circuit Cellar available as a free sample issue. In it, you’ll find a rich variety of the kinds of articles and information that exemplify a typical issue of the current magazine.

December Circuit Cellar: Sneak Preview

The December issue of Circuit Cellar magazine is coming soon. Don’t miss this last issue of Circuit Cellar in 2018. Pages and pages of great, in-depth embedded electronics articles prepared for you to enjoy.

Not a Circuit Cellar subscriber?  Don’t be left out! Sign up today:

 

Here’s a sneak preview of December 2018 Circuit Cellar:

AI, FPGAs and EMBEDDED SUPERCOMPUTING

Embedded Supercomputing
Gone are the days when supercomputing levels of processing required a huge, rack-based systems in an air-conditioned room. Today, embedded processors, FPGAs and GPUs are able to do AI and machine learning kinds of operation, enable new types of local decision making in embedded systems. In this article, Circuit Cellar’s Editor-in-Chief, Jeff Child, looks at these technology and trends driving embedded supercomputing.

Convolutional Neural Networks in FPGAs
Deep learning using convolutional neural networks (CNNs) can offer a robust solution across a wide range of applications and market segments. In this article written for Microsemi, Ted Marena illustrates that, while GPUs can be used to implement CNNs, a better approach, especially in edge applications, is to use FPGAs that are aligned with the application’s specific accuracy and performance requirements as well as the available size, cost and power budget.

NOT-TO-BE-OVERLOOKED ENGINEERING ISSUES AND CHOICES

DC-DC Converters
DC-DC conversion products must juggle a lot of masters to push the limits in power density, voltage range and advanced filtering. Issues like the need to accommodate multi-voltage electronics, operate at wide temperature ranges and serve distributed system requirements all add up to some daunting design challenges. This Product Focus section updates readers on these technology trends and provides a product gallery of representative DC-DC converters.

Real Schematics (Part 1)
Our magazine readers know that each issue of Circuit Cellar has several circuit schematics replete with lots of resistors, capacitors, inductors and wiring. But those passive components don’t behave as expected under all circumstances. In this article, George Novacek takes a deep look at the way these components behave with respect to their operating frequency.

Do you speak JTAG?
While most engineers have heard of JTAG or have even used JTAG, there’s some interesting background and capabilities that are so well know. Robert Lacoste examines the history of JTAG and looks at clever ways to use it, for example, using a cheap JTAG probe to toggle pins on your design, or to read the status of a given I/O without writing a single line of code.

PUTTING THE INTERNET-OF-THINGS TO WORK

Industrial IoT Systems
The Industrial Internet-of-Things (IIoT) is a segment of IoT technology where more severe conditions change the game. Rugged gateways and IIoT edge modules comprise these systems where the extreme temperatures and high vibrations of the factory floor make for a demanding environment. Here, Circuit Cellar’s Editor-in-Chief, Jeff Child, looks at key technology and product drives in the IIoT space.

Internet of Things Security (Part 6)
Continuing on with his article series on IoT security, this time Bob Japenga returns to his efforts to craft a checklist to help us create more secure IoT devices. This time he looks at developing a checklist to evaluate the threats to an IoT device.

Applying WebRTC to the IoT
Web Real-time Communications (WebRTC) is an open-source project created by Google that facilitates peer-to-peer communication directly in the web browser and through mobile applications using application programming interfaces. In her article, Callstats.io’s Allie Mellen shows how IoT device communication can be made easy by using WebRTC. With WebRTC, developers can easily enable devices to communicate securely and reliably through video, audio or data transfer.

WI-FI AND BLUETOOTH IN ACTION

IoT Door Security System Uses Wi-Fi
Learn how three Cornell students, Norman Chen, Ram Vellanki and Giacomo Di Liberto, built an Internet connected door security system that grants the user wireless monitoring and control over the system through a web and mobile application. The article discusses the interfacing of a Microchip PIC32 MCU with the Internet and the application of IoT to a door security system.

Self-Navigating Robots Use BLE
Navigating indoors is a difficult but interesting problem. Learn how these two Cornell students, Jane Du and Jacob Glueck, used Received Signal Strength Indicator (RSSI) of Bluetooth Low Energy (BLE) 4.0 chips to enable wheeled, mobile robots to navigate towards a stationary base station. The robot detects its proximity to the station based on the strength of the signal and moves towards what it believes to be the signal source.

IN-DEPTH PROJECT ARTICLES WITH ALL THE DETAILS

Sun Tracking Project
Most solar panel arrays are either fixed-position, or have a limited field of movement. In this project article, Jeff Bachiochi set out to tackle the challenge of a sun tracking system that can move your solar array to wherever the sun is coming from. Jeff’s project is a closed-loop system using severs, opto encoders and the Microchip PIC18 microcontroller.

Designing a Display System for Embedded Use
In this project article, Aubrey Kagan takes us through the process of developing an embedded system user interface subsystem—including everything from display selection to GUI development to MCU control. For the project he chose a 7” Noritake GT800 LCD color display and a Cypress Semiconductor PSoC5LP MCU.

Connected Padlock Uses U-Blox BLE and Cellular Modules

U‑blox has announced their collaboration with India‑based Play Inc. on a connected GPS padlock for industrial applications. The lock, which doubles as a location tracker, features a U‑blox M8 GNSS receiver, MAX‑M8Q, and uses the u‑blox CellLocate service to extend positioning to indoor locations. U‑blox Bluetooth low energy with NINA‑B112, and 2G, 3G and 4G U‑blox cellular communication modules, including some that are ATEX certified, enable communication between users and the lock.
According to the company, In many industrial settings, locks are an unwelcome bottleneck. They typically require the physical presence of a person with a key to open them, they need to be checked periodically for signs of tampering, and when they are forced open, owners typically find out too late. Play Inc’s i‑Lock combines physical toughness and wireless technology to address these challenges. Offering a variety of access methods, including physical keys and keyless approaches using remote GPRS and SMS passwords as well as Bluetooth low energy or cloud‑based communication via mobile device apps, the i‑Lock lets plant managers or other customers flexibly grant authorization to access the goods that are under lock. And in the event that the padlock is forcefully opened, they are immediately alerted via a server or, optionally, SMS texting.

In addition to securing mobile and stationary goods, the lock’s GNSS receiver lets users track goods in transit. The i‑Lock supports a variety of tracking modes to optimize power consumption for increased autonomy. Location‑awareness further enables geofence restricted applications, in which the i‑Lock can only be open if it is within predefined geographical bounds—for example a petroleum filling station.

The security lock was designed to endure both physical attempts of tampering and cyberattacks. Its fiberglass reinforced enclosure withstands temperatures from -20 to +80 degrees C. The lock features Super Admin, Admin, and User access levels, 128-bit AES encryption, user‑configurable passwords, and a secure protocol to ensure data‑transmission accuracy.

The i‑Lock will be presented at The IoT Solutions Congress Barcelona on October 16‑18, 2018.

U-blox | www.u-blox.com

November Circuit Cellar: Sneak Preview

The November issue of Circuit Cellar magazine is coming soon. Clear your decks for a new stack of in-depth embedded electronics articles prepared for you to enjoy.

Not a Circuit Cellar subscriber?  Don’t be left out! Sign up today:

 

Here’s a sneak preview of November 2018 Circuit Cellar:

SOLUTIONS FOR SYSTEM DESIGNS

3D Printing for Embedded Systems
Although 3D printing for prototyping has existed for decades, it’s only in recent years that it’s become a mainstream tool for embedded systems development. Today the ease of use of these systems has reached new levels and the types of materials that can be used continues to expand. This article by Circuit Cellar’s Editor-in-Chief, Jeff Child looks at the technology and products available today that enable 3D printing for embedded systems.

Add GPS to Your Embedded System
We certainly depend on GPS technology a lot these days, and technology advances have brought fairly powerful GPS functionally into our pockets. Today’s miniaturization of GPS receivers enables you to purchase an inexpensive but capable GPS module that you can add to your embedded system designs. In this article, Stuart Ball shows how to do this and take advantage of the GPS functionality.

FCL for Servo Drives
Servo drives are a key part of many factory automation systems. Improving their precision and speed requires attention to fast-current loops and related functions. In his article, Texas Instruments’ Ramesh Ramamoorthy gives an overview of the functional behavior of the servo loops using fast current loop algorithms in terms of bandwidth and phase margin.

FOCUS ON ANALOG AND POWER

Analog and Mixed-Signal ICs
Analog and mixed-signal ICs play important roles in a variety of applications. These applications depend heavily on all kinds of interfacing between real-world analog signals and the digital realm of processing and control. Circuit Cellar’s Editor-in-Chief, Jeff Child, dives into the latest technology trends and product developments in analog and mixed-signal chips.

Sleeping Electronics
Many of today’s electronic devices are never truly “off.” Even when a device is in sleep mode, it draws some amount of power—and drains batteries. Could this power drain be reduced? In this project article, Jeff Bachiochi addresses this question by looking at more efficient ways to for a system to “play dead” and regulate power.

BUILDING CONNECTED SYSTEMS FOR THE IoT EDGE

Easing into the IoT Cloud (Part 1)
There’s a lot of advantages for the control/monitoring of devices to communicate indirectly with the user interface for those devices—using some form of “always-on” server. When this server is something beyond one in your home, it’s called the “cloud.” Today it’s not that difficult to use an external cloud service to act as the “middleman” in your system design. In this article, Brian Millier looks at the technologies and services available today enabling you to ease in to the IoT cloud.

Sensors at the Intelligent IoT Edge
A new breed of intelligent sensors has emerged aimed squarely at IoT edge subsystems. In this article, Mentor Graphics’ Greg Lebsack explores what defines a sensor as intelligent and steps through the unique design flow issues that surround these kinds of devices.

FUN AND INTERESTING PROJECT ARTICLES

MCU-Based Project Enhances Dance Game
Microcontrollers are perfect for systems that need to process analog signals such as audio and do real-time digital control in conjunction with those signals. Along just those lines, learn how two Cornell students Michael Solomentsev and Drew Dunne recreated the classic arcade game “Dance Dance Revolution” using a Microchip Technology PIC32 MCU. Their version performs wavelet transforms to detect beats from an audio signal to synthesize dance move instructions in real-time without preprocessing.

Building an Autopilot Robot (Part 2)
In part 1 of this two-part article series, Pedro Bertoleti laid the groundwork for his autopiloted four-wheeled robot project by exploring the concept of speed estimation and speed control. In part 2, he dives into the actual building of the robot. The project provides insight to the control and sensing functions of autonomous electrical vehicles.

… AND MORE FROM OUR EXPERT COLUMNISTS

Embedded System Security: Live from Las Vegas
This month Colin O’Flynn summarizes a few interesting presentations from the Black Hat conference in Las Vegas. He walks you through some attacks on bitcoin wallets, x86 backdoors and side channel analysis work—these and other interesting presentations from Black Hat.

Highly Accelerated Product Testing
It’s a fact of life that every electronic system eventually fails. Manufacturers use various methods to weed out most of the initial failures before shipping their product. In this article, George Novacek discusses engineering attempts to bring some predictability into the reliability and life expectancy of electronic systems. In particular, he focuses on Highly Accelerated Lifetime Testing (HALT) and Highly Accelerated Stress Screening (HASS).

Security Takes Center Stage for MCUs

Enabling Secure IoT

Embedded systems face security challenges unlike those in the IT realm. To meet those needs, microcontroller vendors continue to add ever-more sophisticated security features to their devices—both on their own and via partnerships with security specialists.

By Jeff Child, Editor-in-Chief

For embedded systems, there is no one piece of technology that can take on all the security responsibilities of a system on their own. Indeed, everything from application software to firmware to data storage has a role to play in security. That said, microcontollers have been trending toward assuming a central role in embedded security. One driving factor for this is the Internet-of-Things (IoT). As the IoT era moves into full gear, all kinds of devices are getting more connected. And because MCUs are a key component in those connected systems, MCUs have evolved in recent years to include more robust security features on chip.

That trend has continued over the last 12 months, with the leading MCU vendors ramping up those embedded security capabilities in a variety of ways—some on their own and some by teaming up with hardware and software security specialists.

Built for IoT Security

Exemplifying these trends, Microchip Technology in June released its SAM L10 and SAM L11 MCU families (Figure 1). The devices were designed to address the increasing risks of exposing intellectual property (IP) and sensitive information in IoT-based embedded systems. The MCU families are based on the Arm Cortex-M23 core, with the SAM L11 featuring Arm TrustZone for Armv8-M, a programmable environment that provides hardware isolation between certified libraries, IP and application code. Security features on the MCUs include tamper resistance, secure boot and secure key storage. These, combined with TrustZone technology, protect applications from both remote and physical attacks.

Figure 1
The SAM L10 and SAM L11 MCU families provide TrustZone for Armv8-M hardware isolation between certified libraries, IP and application code. The MCUs also feature tamper resistance, secure boot and secure key storage.

In addition to TrustZone technology, the SAM L11 security features include an on-board cryptographic module supporting Advanced Encryption Standard (AES), Galois Counter Mode (GCM) and Secure Hash Algorithm (SHA). The secure boot and secure key storage with tamper detection capabilities establish a hardware root of trust. It also offers a secure bootloader for secure firmware upgrades.

Microchip has partnered with Trustonic, a member of Microchip’s Security Design Partner Program, to offer a comprehensive security solution framework that simplifies implementation of security and enables customers to introduce end products faster. Microchip has also partnered with Secure Thingz and Data I/O Corporation to offer secure provisioning services for SAM L11 customers that have a proven security framework.

Wireless MCU

Likewise focusing on IoT security, NXP Semiconductor in February announced its K32W0x wireless MCU platform. According to NXP, it’s the first single-chip device with a dual-core architecture and embedded multi-protocol radio. It provides a solution for miniaturizing sophisticated applications that typically require a larger, more costly two-chip solution. Examples include consumer devices such as wearables, smart door locks, thermostats and other smart home devices.

The K32W0x embeds a dual-core architecture comprised of an Arm Cortex-M4 core for high performance application processing and a Cortex-M0+ core for low-power connectivity and sensor processing. Memory on chip includes 1.25 MB of flash and 384 KB of SRAM. Its multi-protocol radio supports Bluetooth 5 and IEEE 802.15.4 including the Thread IP-based mesh networking stack and the Zigbee 3.0 mesh networking stack.

Figure 2
Security features of the K32W0x MCU include a cryptographic sub-system that has a dedicated core, dedicated instruction and data memory for encryption, signing and hashing algorithms including AES, DES, SHA, RSA and ECC.

Features of the K32W0x’s security system include a cryptographic sub-system that has a dedicated core, dedicated instruction and data memory for encryption, signing and hashing algorithms including AES, DES, SHA, RSA and ECC. Secure key management is provided for storing and protecting sensitive security keys (Figure 2). Support is enabled for erasing the cryptographic sub-system memory, including security keys, upon sensing a security breach or physical tamper event. The device has a Resource Domain Controller for access control, system memory protection and peripheral isolation. Built-in secure boot and secure over-the-air programming is supported to assure only authorized and authenticated code runs in the device.

To extend the on-chip security features of the K32W0x MCU platform, NXP has collaborated with B-Secur, an expert in biometric authentication, to develop a system that uses an individual’s unique heart pattern (electrocardiogram/ECG) to validate identity, making systems more secure than using an individual’s fingerprint or voice.

IP Boosts Security

For its part, Renesas Electronics addressed the IoT security challenge late last year when it expanded its RX65N/RX651 Group MCU lineup.  …

Read the full article in the October 339 issue of Circuit Cellar

Don’t miss out on upcoming issues of Circuit Cellar. Subscribe today!

Note: We’ve made the October 2017 issue of Circuit Cellar available as a free sample issue. In it, you’ll find a rich variety of the kinds of articles and information that exemplify a typical issue of the current magazine.

Preventing IoT Edge Device Vulnerabilities

FREE White Paper –
Security issues around IoT edge devices are rarely mentioned in the literature. However, the projected billions of IoT edge devices out in the wild makes for a vast attack surface. Should hardware designers be concerned about security for IoT edge devices? And, is it worth the effort and cost to ensure security at this level? We explore internal design vulnerabilities and 3rd-party attacks on IoT edge devices in this paper in order to answer that question.

Get your copy – here

Compact MCU Offers Enhanced Security Features

Maxim Integrated Products has announced the MAX32558 “DeepCover” family of secure microcontrollers that provide advanced cryptography, secure key storage and tamper detection in a 50% smaller package. As electronic products become smaller and increasingly connected, there is a growing threat to sensitive information and privacy, requiring manufacturers to keep security top of mind when designing their devices. While designers should prevent security breaches at the device level, they often struggle with the tradeoff of enhanced security with minimized board space, as well as the cost of design complexity and meeting time to market goals.
The MAX32558 DeepCover Arm Cortex-M3 flash-based secure microcontroller solves these challenges by delivering strong security in a small footprint while simplifying design integration and speeding time to market. It integrates several security features into a small package, including secure key storage, a secure bootloader, active tamper detection and secure cryptographic engines. It also supports multiple communications channels such as USB, serial peripheral interface (SPI), universal asynchronous receiver-transmitter (UART) and I2C, making it ideal for a wide range of applications. Maxim’s long-standing reputation and experience in payment terminal certifications as well as its established support and technology can help streamline the certification process for customers, reducing the process up to 6 months’ time (rather than the typical 12 to 18 months).

Security:Features:

  • Shields sensitive data by providing the most secure key storage available
  • Offers secure bootloader, active tamper detection and secure cryptographic engines
  • Compliant with Federal Information Processing Standard (FIPS) 140-2 L3&4 certification

Compared to a secure authenticator, the MAX32558 provides 30x more general-purpose input/output (GPIO) in the same PCB footprint (4.34 mm x 4.34 mm) wafer-level package (WLP). The closest competitor, meanwhile, offers a device with similar features but in a much larger package (8 mm x 9 mm ball-grid array 121 (BGA121)). The devices reduces footprint by embedding a number of security features to address point-of-sale Payment Card Industry (PCI) pin transaction security (PTS) requirements, as well as several analog interfaces. It provides 512 KB of internal flash and 96 KB of internal SRAM

Easy design integration is enabled by a complete software framework including real-time operating system (RTOS) integration and code examples in evaluation kit. Code can be easily ported from one device to another as it shares the same API software library as the rest of the product family. A pre-certified Europay, Mastercard and Visa (EMV)-L1 stack for smartcard interface is provided. Extensive documentation and code is provided for managing the device lifecycle, such as secure firmware signing and device personalization. The MAX32558 is available at Maxim’s website for $3.80 (1,000-up).

Maxim Integrated | www.maximintegrated.com

September Circuit Cellar: Sneak Preview

The September issue of Circuit Cellar magazine is coming soon. Clear your decks for a new stack of in-depth embedded electronics articles prepared for you to enjoy.

Not a Circuit Cellar subscriber?  Don’t be left out! Sign up today:

 

Here’s a sneak preview of September 2018 Circuit Cellar:

MOTORS, MOTION CONTROL AND MORE

Motion Control for Robotics
Motion control technology for robotic systems continues to advance, as chip- and board-level solutions evolve to meet new demands. These involve a blending of precise analog technologies to control position, torque and speed with signal processing to enable accurate, real-time motor control. Here, Circuit Cellar’s Editor-in-Chief, Jeff Child, looks the latest technology and product advances in motion control for robotics.

Electronic Speed Control (Part 3)
Radio-controlled drones are one among many applications that depend on the use of an Electronic Speed Controller (ESC) as part of its motor control design. After observing the operation of a number of ESC modules, in this part Jeff Bachiochi focuses in more closely on the interaction of the ESC with the BLDC motor.

BUILDING CONNECTED SYSTEMS

Product Focus: IoT Gateways
IoT gateways are a smart choice to facilitate bidirectional communication between IoT field devices and the cloud. Gateways also provide local processing and storage capabilities for offline services as well as near real-time management and control of edge devices. This Product Focus section updates readers on these technology trends and provides a product gallery of representative IoT gateways.

Wireless Weather Station
Integrating wireless technologies into embedded systems has become much easier these days. In this project article, Raul Alvarez Torrico describes his home-made wireless weather station that monitors ambient temperature, relative humidity, wind speed and wind direction, using Arduino and a pair of cheap Amplitude Shift Keying (ASK) radio modules.

FOCUS ON ANALOG AND POWER TECHNOLOGY

Frequency Modulated DDS
Prompted by a reader’s query, Ed became aware that you can no longer get crystal oscillator modules tuned to specific frequencies. With that in mind, Ed set out to build a “Channel Element” replacement around a Teensy 3.6 board and a DDS module. In this article, Ed Nisley explains how the Teensy’s 32-bit datapath and 180 MHz CPU clock affect the DDS frequency calculations. He then explores some detailed timings.

Power Supplies / Batteries
Sometimes power decisions are left as an afterthought in system designs. But your choice of power supply or battery strategy can have a major impact on your system’s capabilities. Circuit Cellar’s Editor-in-Chief, Jeff Child, dives into the latest technology trends and product developments in power supplies and batteries.

Murphy’s Laws in the DSP World (Part 3)
Unpredictable issues crop up when you move from the real world of analog signals and enter the world of digital signal processing (DSP). In Part 3 of this article series, Mike Smith and Mai Tanaka focuses on strategies for how to—or how to try to—avoid Murphy’s Laws when doing DSP.

SYSTEM DESIGN ISSUES IN VIDEO AND IMAGING

Virtual Emulation for Drones
Drone system designers are integrating high-definition video and other features into their SoCs. Verifying the video capture circuitry, data collection components and UHD-4K streaming video capabilities found in drones is not trivial. In his article, Mentor’s Richard Pugh explains why drone verification is a natural fit for hardware emulation because emulation is very efficient at handling large amounts of streamed data.

LIDAR 3D Imaging on a Budget
Demand is on the rise for 3D image data for use in a variety of applications, from autonomous cars to military base security. That has spurred research into high precision LIDAR systems capable of creating extremely clear 3D images to meet this demand. Learn how Cornell student Chris Graef leveraged inexpensive LIDAR sensors to build a 3D imaging system all within a budget of around $200.

AND MORE FROM OUR EXPERT COLUMNISTS

Velocity and Speed Sensors
Automatic systems require real-life physical attributes to be measured and converted to electrical quantities ready for electronic processing. Velocity is one such attribute. In this article, George Novacek steps through the math, science and technology behind measuring velocity and the sensors used for such measurements.

Recreating the LPC Code Protection Bypass
Microcontroller fuse bits are used to protect code from being read out. How well do they work in practice? Some of them have been recently broken. In this article Colin O’Flynn takes you through the details of such an attack to help you understand the realistic threat model.

MCUs Bring Enhanced Security to IoT Systems

Microchip has announced its SAM L10 and SAM L11 MCU families addressing the growing need for security in IoT applications. The new MCU families are based on the Arm Cortex-M23 core, with the SAM L11 featuring Arm TrustZone for Armv8-M, a programmable environment that provides hardware isolation between certified libraries, IP and application code. Security features on the MCUs include tamper resistance, secure boot and secure key storage. These, combined with TrustZone technology, protect applications from both remote and physical attacks.

In addition to TrustZone technology, the SAM L11 security features include an on-board cryptographic module supporting Advanced Encryption Standard (AES), Galois Counter Mode (GCM) and Secure Hash Algorithm (SHA). The secure boot and secure key storage with tamper detection capabilities establish a hardware root of trust. It also offers secure bootloader for secure firmware upgrades.

Microchip has partnered with Trustonic, a member of Microchip’s Security Design Partner Program, to offer a comprehensive security solution framework that simplifies implementation of security and enables customers to introduce end products faster. Microchip has also partnered with Secure Thingz and Data I/O Corporation to offer secure provisioning services for SAM L11 customers that have a proven security framework.

Both MCU families offer Microchip’s latest-generation Peripheral Touch Controller (PTC) for capacitive touch capabilities. Designers can easily add touch interfaces that provide an impressively smooth and efficient user experience in the presence of moisture and noise while maintaining low power consumption. The touch interface makes the devices ideal for a myriad of automotive, appliance, medical and consumer Human Machine Interface (HMI) applications.

The SAM L10 and SAM L11 Xplained Pro Evaluation Kits are available to kick-start development. All SAM L10/L11 MCUs are supported by the Atmel Studio 7 Integrated Development Environment (IDE), IAR Embedded Workbench, Arm Keil MDK as well as Atmel START, a free online tool to configure peripherals and software that accelerates development. START also supports TrustZone technology to configure and deploy secure applications. A power debugger and data analyzer tool are available to monitor and analyze power consumption in real time and fine tune the consumption numbers on the fly to meet application needs. Microchip’s QTouch Modular Library, 2D Touch Surface Library and QTouch Configurator are also available to simplify touch development.

Devices in the SAM L10 series are available starting at $1.09 (10,000s). Devices in the SAM L11 series are available starting at $1.22 (10,000s).

Microchip Technology | www.microchip.com