industry news
Subscribe Now

iWave Systems introduces Security Suite for NXP i.MX Applications Processors to secure connected devices

With the rise of connected devices and the potential of exposure to a large attack surfaces through various wireless technologies, there is now a great need to implement security by design in embedded connected products.  Devices connected to a digital network can be subject to an attack; iWave introduced a Security Suite to protect the billions of connected IoT devices. 

The iWave Security Suite is developed for NXP i.MX 6 series, i.MX 8, i.MX 8X and i.MX 8M application processors. With these processors built for numerous IoT and automotive applications such as gateways, multiple display applications, industrial systems, telematics units and V2X Solutions, there is a need to build a secure environment around the processors. 

The iWave Security Suite helps secure connected devices, enabling them with security functions such as encryption, storage, data transmission and certificate management. The easy to integrate solution helps address the security challenges creating a safe and secure environment. The iWave Security Suite includes secure boot, Wi-Fi secure API, event logging, OS hardening, access control, software firewall and secure firmware update to name a few.

i.MX 8 and i.MX 8X family application processors features Advanced High Assurance Boot (AHAB) and a Security Controller (SECO) while the i.MX 6 and i.MX 8M applications processors features High Assurance Boot (HAB). 

In i.MX 6, HABv4 enables ROM to authenticate the Bootloader and kernel image. In i.MX 8 and i.MX 8X family, AHAB enables SECO APIs to authenticate System Controller Unit (SCU) FW, SECO FW, Bootloader and kernel images which establish a chain of trust for the remaining software components by establishing a secure state of the system. The scripts provided by iWave along with the NXP Code Signing Tool (CST) makes the signing process extremely easy and simple.

Secure File System takes an end-to-end approach of protecting data by cryptography preventing unauthorized access to the data storage. Without proper encryption keys, data stored on any encrypted file system cannot be read (decrypted) with an entire secure storage partition encrypted and the root file system will be loaded.

Secure storage involves protecting data stored in storage devices like eMMC, MicroSD and many more. The Security Suite facilitates secure storage APIs to encrypt and decrypt the storage device partition on run time, data integrity and data encryption etc.   Secure storage APIs use Cryptographic Accelerator and Assurance Module (CAAM) black keys to store the key in the CAAM blob format so that data/key is secured in non-volatile storage device across power cycles.

The   Security Suite supports robust easy to use APIs to integrate with 3rd party application and devices. The suite encompasses a compact package with a multi-level security solution. 

More information on the Security Suite can be found here or watch this video for a quick overview : 

For further information or enquiries, you can reach us at

iWave Systems is a gold member of the NXP Partner Program, a global network of engineering companies collaborating with NXP to bring you exceptional software, tools, training, and services, and ultimately speed your time to market. To learn more, visit the iWave partner page on  


Leave a Reply

featured blogs
May 12, 2021
The ICADVM20.1 ISR18 and IC6.1.8 ISR18 production releases are now available for download at Cadence Downloads . For information on supported platforms and other release compatibility information,... [[ Click on the title to access the full blog on the Cadence Community site...
May 11, 2021
Human vision in indispensable and often taken for granted. Similarly machine, or embedded, vision influences daily human life in ways thought impossible. Simply, machine vision refers to the ability of embedded systems to “see”. Key system components include camer...
May 6, 2021
Learn how correct-by-construction coding enables a more productive chip design process, as new code review tools address bugs early in the design process. The post Find Bugs Earlier Via On-the-Fly Code Checking for Productive Chip Design and Verification appeared first on Fr...
May 4, 2021
What a difference a year can make! Oh, we're not referring to that virus that… The post Realize Live + U2U: Side by Side appeared first on Design with Calibre....

featured video

Introduction to EMI

Sponsored by Texas Instruments

Conducted versus radiated EMI. CISPR-25 and CISPR-32 standards. High-frequency or low-frequency emissions. Designing a system to reduce EMI can be overwhelming, but it doesn’t have to be. Watch this video to get an overview of EMI causes, standards, and mitigation techniques.

Click here for more information

featured paper

Bring a "Can-Do" Attitude to Your Industrial Drone Design

Sponsored by Maxim Integrated

Providing predictable and error-free communications, CAN bus networks have been the workhorse of the automobile industry for over thirty years. But they have recently found a new lease on life in other industrial applications, including drones. This design solution shows where and how CAN transceivers can be used in drone designs and explains why it is important that they come with high levels of electrical protection.

Click to read more

Featured Chalk Talk

Accelerate the Integration of Power Conversion with microBUCK® and microBRICK™

Sponsored by Mouser Electronics and Vishay

In the world of power conversion, multi-chip packaging, thermal performance, and power density can make all of the difference in the success of your next design. In this episode of Chalk Talk, Amelia Dalton chats with Raymond Jiang about the trends and challenges in power delivery and how you can leverage the unique combination of discrete MOSFET design, IC expertise, and packaging capability of Vishay’s microBRICK™and microBUCK® integrated voltage regulators.

Click here for more information about Vishay microBUCK® and microBRICK™ DC/DC Regulators