A new Whitepaper shows how to apply a systematic design process to protect your IoT devices.
Unprotected IoT devices are an easy target for cyber-attacks. The ZHAW Institute of Embedded Systems has published a Whitepaper that describes the application of a systematic development process to identify threats, derive security requirements and implement effective protection measures. The example of a simple WiFi-based sensor illustrates the design process and adequate protection measures. Microcontrollers featuring Trusted Execution Environments (TEE) as well as Secure Elements both provide options to store key material securely and perform cryptographic operations in an energy-efficient way. The interaction of these hardware components together with dedicated firmware and a Public Key Infrastructure (PKI) enables a low-power sensor to connect securely to the cloud.
The Whitepaper and an accompanying video are available under https://digitalcollection.zhaw.ch/handle/11475/20718