Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

What you need for IoT security (Part 3): IoT devices security

Manoj Kumar Rai, Head of M2M Solutions, South Asia & Japan, Gemalto | Aug. 15, 2016
Gemalto's Manoj Kumar talks about securing IoT devices from both the hardware and software aspects.

Conclusion:
Securing IoT devices and its software can be achieved through creation of a trusted environment, where the root of trust is anchored in a tamper-proof hardware. Use of cryptography to ensure confidentiality, integrity and authenticity of devices, including software, firmware and data residing on it, can be a significant defense against many attacks.  The same infrastructure should be used in the whole supply chain for the device and services.  Furthermore the same infrastructure needs to be implemented on the master/service side to complete the trusted environment.

 

 

Previous Page  1  2  3  4 

Sign up for CIO Asia eNewsletters.