- This topic has 1 voice and 0 replies.
Viewing 0 reply threads
Viewing 0 reply threads
- You must be logged in to reply to this topic.
› Forums › Security › News (Security) › Identifying the Internet of Things – one device at a time
Tagged: SecureElement_H11, Security_S12
#News(Security) [ via IoTForIndiaGroup ]
To securely build and grow an IoT ecosystem, one must have the tools and architectures in place to identify, control and manage their IoT devices. This process begins with establishing a strong identity within each IoT device. Here are some of the ways in which we can verify the authenticity of IoT devices before on-boarding them.
What could we use to define the authenticity of a device?
1. A pre-embedded Root of Trust (ROT)
2. A device whitelist
3. Challenge-response
4. Behavioural signature
5. Environmental checks
6. One-time trust event