Code and boot time authentication, how to establish a chain of trust, process separation and space partitioning, and other things you need to consider.
In today’s connected world, IoT wearable devices should be built from the ground up to include basic, fundamental security capabilities. This whitepaper explains the key security technologies critical for creating a secure IoT embedded device. Topics include code and boot-time authentication, establishing a chain of trust, process separation and space partitioning, using a safety-certified operating system, and ARM’s Trustzone.
To read more, click here.
Leave a Reply