IoT Foundations of Trust

Published 1 month ago

This whitepaper will discuss the technical foundation of trust necessary to establish proper security within an Internet of Things (IoT) ecosystem

This research whitepaper identifies the trust attributes necessary to create a root of trust within an IoT device for cybersecurity professionals.  It will also outline how secure elements, cryptography, immutable code, secure boot, and isolated environments are used to achieve the attributes of trust. Lastly, the paper will outline the common implementations of hardware roots of trust including the Trusted Execution Environment, Trusted Platform Module, Hardware Security Module, Device Identifier Composition Engine, and Smartcards.


Offered Free by: Cybrary

We'll never share your email with anyone else.