Securing IoT devices and its software can be achieved through creation of a trusted environment, where the root of trust is anchored in a tamper-proof hardware. Use of cryptography to ensure confidentiality, integrity and authenticity of devices, including software, firmware and data residing on it, can be a significant defense against many attacks. The same infrastructure should be used in the whole supply chain for the device and services. Furthermore the same infrastructure needs to be implemented on the master/service side to complete the trusted environment.
Sign up for CIO Asia eNewsletters.