MIPI Alliance forms group to define embedded security considerations
Security experts invited to help recommend scope and role of security in MIPI specifications for automotive, IoT, biometric, point-of-Sale and other use cases
The MIPI Alliance, an international organization that develops interface specifications for mobile and mobile-influenced industries, has formed a Security Birds of a Feather (BoF) group to evaluate potential needs and strategies for addressing security in MIPI Alliance interface specifications. The Alliance is issuing a call for participation in the BoF to engage the broadest possible community of security representatives in this work. The group is open to MIPI Alliance member companies as well as non-member security experts.
While MIPI Alliance’s interface specifications are industry de facto in mobile devices and a broad range of mobile-influenced applications, the Security BoF provides an opportunity to engage the broader mobile ecosystem to ensure that the security needs of the industries served are met. The new security BoF, in partnership with the MIPI Alliance Technical Steering Group (TSG), will provide recommendations and guidelines to the MIPI Alliance Board of Directors on how to address the ever-growing mobile security concerns. These strategic initiatives will impact security design decisions in mobile components and chipsets, smartphones, mobile-connected devices, IoT products, automotive use cases and other applications.
We expect the work of this group to provide strategic value
“The security BoF will help the MIPI Alliance define security needs and guide a consistent approach for addressing security in MIPI specifications,” said Enrico Carrieri, chair of the MIPI Alliance Security Birds of a Feather group. “We expect the work of this group to provide strategic value for those developing products in mobile devices, automotive, wearables, biometrics, point-of-sale devices and many other growing markets.”
For example, the security BoF is investigating how MIPI specifications can address security concerns such as confidentiality, integrity and availability. The group is examining use cases involving endpoint identity, sensed and biometric data, and protected content, with a goal of proposing a framework to specification adopters that details the security objectives and threat models.