IoT Foundations of Trust

This research whitepaper identifies the trust attributes necessary to create a root of trust within an IoT device for cybersecurity professionals.  It will also outline how secure elements, cryptography, immutable code, secure boot, and isolated environments are used to achieve the attributes of trust. Lastly, the paper will outline the common implementations of hardware roots of trust including the Trusted Execution Environment, Trusted Platform Module, Hardware Security Module, Device Identifier Composition Engine, and Smartcards.

Request Free!