{"id":4410,"date":"2022-08-11T02:10:00","date_gmt":"2022-08-11T02:10:00","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?post_type=dlp_document&p=4410"},"modified":"2022-08-09T06:21:35","modified_gmt":"2022-08-09T06:21:35","slug":"securing-the-aiot-safeguarding-ai-at-the-edge","status":"publish","type":"dlp_document","link":"https:\/\/www.pufsecurity.com\/zh-hans\/document\/securing-the-aiot-safeguarding-ai-at-the-edge\/","title":{"rendered":"Securing the AIoT: Safeguarding AI at the Edge"},"content":{"rendered":"\n

Edge AI computing has been a trending topic in recent years. The market was already valued at $9 billion in 2020, projected to surpass $60 billion by 2030 (Allied Market Research). Initially driven by computer vision systems (particularly for use in autonomous vehicles \u2013 no pun intended), the proliferation of other edge applications, such as advanced noise cancellation and spatial audio, has further accelerated the growth of the Edge AI computing Market.<\/p>\n\n\n\n

Whether computation takes place in the cloud or down at the edge, data protection remains vital to ensuring the safety of AI system operations. Integrity checking and secure boot\/update, for example, are undoubtedly mission-critical. Furthermore, for applications that have a direct bearing on people\u2019s lives (such as smart cars, healthcare, smart locks, and industrial IoT), a successful attack would not only affect the safety of that application\u2019s data set but also potentially endanger lives. Imagine the case for a smart camera surveillance system, when intrusions and hazards wouldn\u2019t be inferred and detected correctly if a hacker manages to alter the AI model or the input streaming images.<\/p>\n\n\n\n

Unlike a standard CPU, which is ready to use out of the box, a neural network needs to be taught how to make the correct inferences before being put to use. Therefore, AI system creators must include the training stage when planning for system security. This means that besides the hardware itself (including the neural network accelerator), other related attack surfaces need to be considered. These include:<\/p>\n\n\n\n