This whitepaper will discuss the technical foundation of trust necessary to establish proper security within an Internet of Things (IoT) ecosystem
This research whitepaper identifies the trust attributes necessary to create a root of trust within an IoT device for cybersecurity professionals. It will also outline how secure elements, cryptography, immutable code, secure boot, and isolated environments are used to achieve the attributes of trust. Lastly, the paper will outline the common implementations of hardware roots of trust including the Trusted Execution Environment, Trusted Platform Module, Hardware Security Module, Device Identiﬁer Composition Engine, and Smartcards.
Offered Free by: Cybrary See All Resources from: Cybrary
Recommended for Professionals Like You:
This download should complete shortly.
If the resource doesn't automatically download, please, click here.