End-to-end Security Derived from a Hardware Based Root of Trust
Trust & Security
50-Minute Technical Session
Audience Level: Intermediate
Too many IoT deployments both within the consumer space and within Industrial IoT, lack a trusted end-to-end security solution starting with device and service attestation leverage a HW based secure root of trust to enable secure on-boarding, the communication, the data and the interaction in a M2M or M2C context from a trusted source. Without the level of device trust and assurance, data sent from the device, or any interaction with it can be bogus and not trusted. Data privacy, confidentiality will be compromised, IoT devices including anything from toys to cars not trusted and secured.
IoT security needs to be designed and provisioned at manufacturing time, derived from a hardware based root of trust. Arm Trustzone is an good enabler to ensure and provide such trust. This root of trust is fundamental to enable unique device credentials, prove of authenticity, source for data, source or target for automation, and encrypt and sign data at the edge. Only in conjunction with a single IoT security solution, IoT security and trust across device and users end-to-end can be guaranteed.