Securing the future for IoT devices
The world is becoming increasingly connected, not just through smartphones, but also via connected devices in our cars, our homes and our cities. This opens up many new and exciting opportunities, but also introduces challenges around how we protect and secure individual users and service providers.
IoT devices need to be built on a proven foundation of hardware backed security that will provide robust protection long into the future. It will also be vitally important to be able to distinguish between ‘trustworthy’ and ‘untrustworthy’ devices.
Trustonic’s hardware-backed security and Root of Trust foundation forms the basis upon which a secure and trusted IoT infrastructure should be built.
Trustonic has developed two versions of its secure TEE operating system; Kinibi and Kinibi-M.
Kinibi is the operating system that is used to protect application-level processors, such as the ARM Cortex-A range. These processors are used in most smartphones and higher-end IoT devices.
Kinibi-M, on the other hand, is used to secure low-power, low-cost processors, (e.g. MCUs), which are mainly used in sensors and other single-use devices. Processors in these devices are typically those from ranges such as ARM’s Cortex-M series.
8.4 billion connected things in 2017, up 31% since 2016
Connected IoT devices interact throughout the day
The fundamental requirements of IoT are that connected devices can be proven to be legitimate and trustworthy, and that the associated services and applications, including any sensitive data and communications, are protected at all times.
To protect IoT devices, they need to be proven to be legitimate, identifiable and manageable. What’s also important to remember, unlike mobile phones which are typically manufactured by one company, IoT devices are often built on top of a module manufactured by another supplier. The device lifecycle can be complex, and legitimacy and identity needs to be managed throughout the manufacturing process, as well as after delivery to a user. In the case of a consumer device, there is also the possibility of device recycling, so solutions need to cater for a change in device ownership, whereby the new owner can be assured that the previous owner no longer has access or control.


Trustonic’s TEE is unique and open, it has been designed to support multiple separate applications, each potentially with a different owner. These separate applications are individually isolated and unable to eavesdrop on each other.

Device Authenticaton
By embedding a Root of Trust into each device during manufacture, the legitimacy of the device can be guaranteed by any connected services.

Secure Cryptography
The TEE has the ability to secure data, communications and cryptographic operations. Encryption keys can be stored, managed and used within the secure environment, with no opportunity for eavesdropping.

Application Protection
Sensitive parts of any application can be executed inside the TEE, ensuring that applications and services are immune from both malware and software based attacks at all times.
Click here to contact Trustonic to learn how you can start working with TAP.