Securing the future for IoT devices
The world is becoming increasingly connected, not just through smartphones, but also via connected devices in our cars, our homes and our cities. This opens up many new and exciting opportunities, but also introduces challenges around how we protect and secure individual users and service providers.
IoT devices need to be built around a proven foundation of hardware backed security that will provide robust protection long into the future. It will also be vitally important to be able to distinguish between ‘trustworthy’ and ‘untrustworthy’ devices.
Trustonic’s hardware backed security and Root of Trust foundation forms the basis upon which a secure and trusted IoT infrastructure should be built.
The fundamental requirements of IoT are that connected devices can be proven to be legitimate and trustworthy, and that the associated services and applications, including any sensitive data and communications, are protected at all times.
To protect IoT devices, they need to be proven to be legitimate, identifiable and manageable. What’s also important to remember, unlike mobile phones which are typically manufactured by one company, IoT devices are often built on top of a module manufactured by another supplier. The device lifecycle can be complex, and legitimacy and identity needs to be managed throughout the manufacturing process, as well as after delivery to a user. In the case of a consumer device, there is also the possibility of device recycling, so solutions need to cater for a change in device ownership, whereby the new owner can be assured that the previous owner no longer has access or control.
Click here to contact Trustonic to learn how you can start working with TAP.