Workload Consolidation is a Good Thing, Right?

Workload consolidation is a great idea: do more with less to lower cost and increase functionality. Two of the primary drivers for workload consolidation are artificial intelligence (AI) and machine learning (ML). AI and ML can both be implemented in the cloud, but for many applications, cloud latency makes this less than feasible. The fix is to bring AI and ML out to the edge.

As you might expect, that action brings about its own set of issues that must be considered. Workload Consolidation and Security for AI and ML explores how security changes with workload consolidation. With advances in new processors and higher levels of integration, there’s certainly more processing resources available at the edge than ever before. For example, the S32V2 series from NXP makes it possible to implement new levels of real-time vision and neural network processing in a wide range of applications.

One important aspect that must be considered is that when you bring processing out to the edge, you bring your IP out with it. No one wants to steal the interpolation algorithm in your temperature sensor. But AI and ML are emerging industries. This technology is still nascent, and frankly, it’s hard. There’s still lots of room for innovation, and companies are differentiating their products from their competition with how they process data and implement their proprietary complex algorithms. As these technologies advance, at some point they will become available as off-the-shelf libraries, much the same way graphics libraries, digital signal processing, speech recognition, and any of a thousand technologies have gone.

But we aren’t there yet, and when your IP is out at the edge, it’s vulnerable. It can be stolen by your competitors if you don’t protect it. So the more valuable the IP you bring to the edge, the more important it is to protect it. You can’t just store it in flash memory because it isn’t that hard to read your code off the memory bus. Code has to be encrypted, and your cryptographic keys need to be stored in a way that they can’t be read off the microprocessor.

But even this isn’t enough. There’s still the vulnerability of the processor itself. If a hacker can upload new code, either as an update or over a debug port, a simple program overwriting your firmware can use the processor’s cryptographic engine to decrypt your code and feed it out through an I2C port.

To protect IP, the processor itself must be secure. This starts with technology like secure boot. Consider the Sitara series of processors from Texas Instruments (Figure 1). These embedded processors establish a trusted root by verifying the integrity of boot firmware before the processor begins any code execution. Once established, the application can be securely loaded and executed, building from this root of trust.

Figure 1: Functional block diagram of Texas Instruments’ Sitara AM335x microprocessors. (Image source: Texas Instruments)

Workload consolidation at the edge enables systems to do more work locally and achieve greater functionality through real-time access to data. At the same time, systems also need to have more security to protect the IP that would now otherwise be exposed. With today’s embedded processors and their integrated security capabilities, IP can be secured. So yes, workload consolidation is a good thing.

About this author

Image of Nicholas Cravotta

Nicholas Cravotta has been technical editor for EDN, Embedded Systems Programming, and Communications Systems Design, and was the founding editor-in-chief of Multimedia Systems Design. With seventeen years of experience as a practicing engineer, he understands the issues behind designing complex systems firsthand. He has worked with hard real-time embedded systems, written application software for PCs and workstations, built an operating system from the ground up, developed in-house software and hardware development and test tools, and ported software across platforms, among other projects. He has written over 800 published articles, taught programming and technical writing at UC Berkeley, and is an award-winning game designer in his spare time.

More posts by Nicholas Cravotta
 TechForum

Have questions or comments? Continue the conversation on TechForum, DigiKey's online community and technical resource.

Visit TechForum