Two approaches to IoT security: secured programming and secured provisioning
There are two main ways of securing an IoT device, through secured programming and secured provisioning.
Secured programming uses software on the device to provide security. This can protect the device’s firmware but may not offer enough protection from cyberattacks such as counterfeiting. And we know from experience that one of the main ways in which attackers compromise systems is by finding and exploiting programming bugs. In some cases, the exploits that follow from such security breaches are unrecoverable.
The secured programming approach is suitable for low-level applications in which a malfunction won’t cause injury or harm. It’s also suitable for devices that provide security without needing two-way communication with the programming system. Secured programming doesn’t rely on additional hardware, which saves money but doesn’t provide as much security as is possible with more costly approaches.
A second technique for device security is secured provisioning, which uses additional hardware to provide security protection throughout the device’s lifecycle. Although the extra hardware means greater upfront costs, the security it provides may be critical to protecting users, in turn avoiding reputational damage to brands and possible litigation.
Secured provisioning helps protect firmware from attacks such as counterfeiting and overbuilding, as well as against software bugs. A hardware root of trust can protect device software and operations from being subverted. It can also stop code being read by unauthorized parties. Secured provisioning protects devices that, if compromised, could cause harm to a person, property damage, loss of sensitive data or intellectual property.
EBV Elektronik can help you focus on places where your organisation offers the greatest competitive edge. We can help you to design and optimize your product, enabling you to focus on product differentiation. Partnering with EBV Elektronik can also help you develop safe and reliable connected devices, which protect your customers, your reputation, and your brand.
ebv content library/home/products/product-highlights/ebv-and-infineon-optiga-product-family-from-infineon/tpm-privisioning/ebv - infineon optiga secure programming static html
EBV - Infineon OPTIGA Secure programming Static HTML