SWRA780A September   2023  – February 2024 CC3300 , CC3301

 

  1.   1
  2.   Abstract
  3.   Trademarks
  4. 1Introduction
    1. 1.1 Terminology and Abbreviations
  5. 2Internet of Things (IoT) Products and Security
    1. 2.1 Physical Access
    2. 2.2 Local Network Connectivity
  6. 3Main Features
    1. 3.1 Secured Boot
      1. 3.1.1 Secured Boot Container
      2. 3.1.2 Secured Boot Flow
    2. 3.2 Wi-Fi Network Security
    3. 3.3 Rollback Protection
    4. 3.4 JTAG Protection
    5. 3.5 Secured Host Interface
  7. 4Revision History

Local Network Connectivity

The general nature of a local network leads to a specific set of attack vectors. For example, monitoring of the wireless network or injecting malicious or abusive traffic on the Wi-Fi or Local Area Network (LAN).

One vector is based on passive monitoring of traffic over the wireless network, without the attacker being connected. A wireless network can be passively monitored, because some of the headers of communication packets are not encrypted even in secured wireless networks. These headers can reveal information such as the MAC addresses of the devices on this network or the temporal properties of the traffic generated.

The Wi-Fi Alliance has regulated security and compliance tests as part of the standards. The CC33xx companion IC is tested with Wi-Fi Alliance testbeds, and complies with all these security requirements.

The second vector relates to attacks generated from another device that is part of the local area network (LAN). This provides additional opportunity for executing an attack vector that involves network access, and the ability to legitimately inject traffic over the network and abuse ports and protocols available on the target device.