SlideShare a Scribd company logo
Securing your IoT “Thing”
Andrew Pockson
21st November, 2018
Slide 2AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC
Microcontrollers / Microprocessors – Security & Encryption
&
STSAFE-A secure services
Secure storage
Secure Firmware upgrade
Easy to use security services for IoT developers
USB Type-C
General Purpose
MCU
STSAFE-A
secure element
I2C
Secure Communication
Authentification
Secure Element
Slide 4AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC
End to End Security – Gateway & Nodes (“Things”)
Securityarchitecture
Sensory Input
Software
Data Protection
Secure Storage
Trust Zone
Secure Boot
JTAG Protection
Unique Key/Certificate
Device Protection
Processor
Storage
Secure Communication
Key M anagem ent
Secure OTA
Secure Channel
Data Protection
Auto Onboarding
M utual Authentication
Device M anagem ent
Slide 5AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC
Device protection and trustedcode execution
Unique, tamper-resistantIDinjected during the
manufacturing process.
ARTIKkeymanagementservice(KMS)and code
signing service
Secureover-the-air (OTA) updates
Secure communications with otherdevices
and the cloud
TLS1.2industry-standard cryptographic algorithms
Mutualauthentication and root of trust
Securedevice registration (SDR)
Secure JTAG
Secure storage, secure file system,and
secure element
TheSamsungeMMC securefile system
ARM®TrustZone
Dataencrypted withruntime-generated key
Tamper-resistantCommon Criteria EAL5
secure element
Physicallyunclonable function (PUF)(ARTIK 053)
*Not including020and030
ARTIK
module
ARTIK
S-module Comments
Deviceprotectionand
trustedexecution
KMSinfrastructureforcode
signing
Keymanagement
service
Code verificationkeyinHW Securekeystorage
Secureboot(checksfor
authorizedcode)
Boot imageverification
JTAGaccesslocked Lockout debugaccess
Secure
communications
Per-deviceunique key and
certificate
Uniquelyidentifies
device
KeystoredinHWsecure element Securekeystorage
PKIinfrastructure: mutual
authenticaionofdeviceandcloud
Devicetalksto
authorizedcloudand vice
versa
Securestorage, secure
file system, andsecure
element
SecureOS(separatesnormaland
secureoperations)
Hardwareenforced secure
applicationsvia TEE
LimitedsecuritylibAPI (3 API
calls)
Randomnumber
generator, get
certificateand
signature
Full securitylib API(27APIcalls) Keymanager,
authentication,secure
storage, encrypt/de- crypt
Credential provisioning Add andmanage
certificatesandkeyson
device(andin secure
element)
Securestorage Encrypt datastoredon
Flash
End to End Security – Gateway & Nodes (“Things”)
Slide 6AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC
Cellular – Module Services
Over-the-air updates are needed
to guarantee the scalability and
profitability of IoT solutions
Slide 7AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC
Cellular – Remote Updates
Unprotected updates
can lead to malicious
software being installed
in field devices,
compromising your
business and reputation
Poorly programmed
update campaigns can
result in excessive data
or energy consumption,
defeating their initial
purpose
Managing thousands of
device updates requires
careful field campaign
planning by customer
care and service
operation teams
+ +
Campaign planning Airtime & energy cost Security threats
Industrial IoT
software
management
tools need to
address these
aspects
specifically
Slide 8AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC
Cellular – Safe and efficient IoT Fleet Updates
Update
Release management ensures only
safe and tested Cinterion firmware and
software can be pushed out to the field
Campaign planning, execution and
verification tools that help operation
teams manage thousands of updates
effectively
Smart campaigns guarantee updates
are data-efficient (incremental) and only
pushed to healthy end-points
Trusted software and application
execution allow only authorized
software to be installed and executed
Integrity &
Source
Verification
Automated
software
deployment
Slide 9AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC
Cellular – Typical Dashboard
Recently
launched
campaigns
Close follow-up
of campaign
execution
Error tracking
and update retry
option
Map
visualization of
failed update
attempts
Slide 10AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC
Anglia Components Ltd
Sandall Road, Wisbech, PE13 2PS
United Kingdom
Tel: +44 (0)1945 47 47 47
www.anglia.com info@anglia.com

More Related Content

PDF
Agile + ISO 26262: Using Agile in Automotive Development
PPTX
Automotive Functional Safety ISO 26262 Training Bootcamp : Tonex Training
PDF
ISO26262 Conference 2019
PPTX
ISO 26262 introduction
PPTX
Automotive Functional Safety ISO 26262 Training Bootcamp - Tonex Training
PDF
Hima cyber security
PPTX
Automotive functional safety iso 26262 training bootcamp 2019
PPTX
ISO 26262 Unit Testing | Functional Safety in Automotive
Agile + ISO 26262: Using Agile in Automotive Development
Automotive Functional Safety ISO 26262 Training Bootcamp : Tonex Training
ISO26262 Conference 2019
ISO 26262 introduction
Automotive Functional Safety ISO 26262 Training Bootcamp - Tonex Training
Hima cyber security
Automotive functional safety iso 26262 training bootcamp 2019
ISO 26262 Unit Testing | Functional Safety in Automotive

What's hot (20)

PPTX
Extronics AeroScout Automatic Mustering & Evacuation Monitoring Solutions
PDF
MISRA Safety Case Guidelines -
PDF
20131216 cisec-standards-jp blanquart-jmastruc
PDF
Why safety plan is critical in development of iso 26262 complaint
PPTX
IEC 62061 introduction
PPTX
ISO 26262 2nd Edition
PPTX
Utilities Monitoring System - energy, water, gas, compressed air
PDF
Outdoor Equipment Tracking customer stories from Extronics Advance
DOCX
NGFW RFP TEMPLATE - TEST PLAN
PDF
TÜV SÜD on functional safety for multi-core architectures
PDF
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
PDF
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
PDF
Achieve iso 26262 certification
PDF
Functional safety standards_for_machinery
PDF
SOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas Instruments
PPT
Apresentação fortinet
PPTX
HARA ISO 26262: What is HARA and Why is it Required?
PDF
Functional integrity certification exida
PDF
WIP Throughput customer stories from Extronics Advance
PDF
Increasing Efficiency of ISO 26262 Verification and Validation by Combining F...
Extronics AeroScout Automatic Mustering & Evacuation Monitoring Solutions
MISRA Safety Case Guidelines -
20131216 cisec-standards-jp blanquart-jmastruc
Why safety plan is critical in development of iso 26262 complaint
IEC 62061 introduction
ISO 26262 2nd Edition
Utilities Monitoring System - energy, water, gas, compressed air
Outdoor Equipment Tracking customer stories from Extronics Advance
NGFW RFP TEMPLATE - TEST PLAN
TÜV SÜD on functional safety for multi-core architectures
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Afry software safety ISO26262 (Embedded @ Gothenburg Meetup)
Achieve iso 26262 certification
Functional safety standards_for_machinery
SOTIF Conference 2019 - APTIV, Toyota, Delphi Tech, Texas Instruments
Apresentação fortinet
HARA ISO 26262: What is HARA and Why is it Required?
Functional integrity certification exida
WIP Throughput customer stories from Extronics Advance
Increasing Efficiency of ISO 26262 Verification and Validation by Combining F...
Ad

Similar to Securing your IoT Thing (20)

PPTX
LAS16-300K2: Geoff Thorpe - IoT Zephyr
PDF
[Webinar] Why Security Certification is Crucial for IoT Success
PDF
Software update for IoT: the current state of play
PDF
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
PDF
Security in Cyber-Physical Systems
PDF
IoT Security and Privacy Considerations
PPTX
Sagar Kadam, Lead Software Engineer, Open-Silicon
PDF
Eurosmart etsi-e-io t-scs-presentation
PPTX
Security Testing for IoT Systems
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PPTX
Io t slides_iotvillage
PPTX
The Present and Future of IoT Cybersecurity
PDF
An Internet of Things Reference Architecture
PPTX
The Insecurity of Industrial Things
PDF
Towards a certification scheme for IoT security evaluation
PPTX
Are we ready for IoT? VU Version 7
PDF
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
PDF
Embedded world 2019 - Cellular IoT device lifecycle management
PDF
Software security, secure software development in the age of IoT, smart thing...
PDF
WSO2Con EU 2015: IoT in Finance
LAS16-300K2: Geoff Thorpe - IoT Zephyr
[Webinar] Why Security Certification is Crucial for IoT Success
Software update for IoT: the current state of play
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Security in Cyber-Physical Systems
IoT Security and Privacy Considerations
Sagar Kadam, Lead Software Engineer, Open-Silicon
Eurosmart etsi-e-io t-scs-presentation
Security Testing for IoT Systems
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
Io t slides_iotvillage
The Present and Future of IoT Cybersecurity
An Internet of Things Reference Architecture
The Insecurity of Industrial Things
Towards a certification scheme for IoT security evaluation
Are we ready for IoT? VU Version 7
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
Embedded world 2019 - Cellular IoT device lifecycle management
Software security, secure software development in the age of IoT, smart thing...
WSO2Con EU 2015: IoT in Finance
Ad

More from Duncan Purves (20)

PDF
Supporting Elderly Independent Living with IOT devices
PDF
The Internet of Trees (IoTr) and is the IoT really sustainable?
PDF
Insights into the IoT market
PDF
Meeting the NIS Directive with Distributed Ledgers
PDF
Extending the reach of IoT to address global scale challenges
PDF
Smart Cities: A new development
PDF
Can you trust your smart building
PDF
Saving lives on British Railways with IQRF
PDF
5G and Connected Communities
PDF
AWS IoT and Alexa in the connected home
PDF
PSA Certified – building trust in IoT
PDF
Smart City Challenge calls
PDF
Vodafone's NB-IoT Rollout
PDF
Are you prepared for R&D funding
PDF
Thames Valley Berkshire Smart City Cluster Challenge
PDF
World Bee Project - The Connected Hive & The Future of Farming
PDF
Bridging the gap between hardware and the cloud
PDF
Cyber Academic Startup Accelerator Programme
PDF
Digital buildings
PDF
The University of Sheffield AMRC
Supporting Elderly Independent Living with IOT devices
The Internet of Trees (IoTr) and is the IoT really sustainable?
Insights into the IoT market
Meeting the NIS Directive with Distributed Ledgers
Extending the reach of IoT to address global scale challenges
Smart Cities: A new development
Can you trust your smart building
Saving lives on British Railways with IQRF
5G and Connected Communities
AWS IoT and Alexa in the connected home
PSA Certified – building trust in IoT
Smart City Challenge calls
Vodafone's NB-IoT Rollout
Are you prepared for R&D funding
Thames Valley Berkshire Smart City Cluster Challenge
World Bee Project - The Connected Hive & The Future of Farming
Bridging the gap between hardware and the cloud
Cyber Academic Startup Accelerator Programme
Digital buildings
The University of Sheffield AMRC

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
1. Introduction to Computer Programming.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Machine Learning_overview_presentation.pptx
Getting Started with Data Integration: FME Form 101
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
SOPHOS-XG Firewall Administrator PPT.pptx
1. Introduction to Computer Programming.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine Learning_overview_presentation.pptx

Securing your IoT Thing

  • 1. Securing your IoT “Thing” Andrew Pockson 21st November, 2018
  • 2. Slide 2AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC Microcontrollers / Microprocessors – Security & Encryption &
  • 3. STSAFE-A secure services Secure storage Secure Firmware upgrade Easy to use security services for IoT developers USB Type-C General Purpose MCU STSAFE-A secure element I2C Secure Communication Authentification Secure Element
  • 4. Slide 4AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC End to End Security – Gateway & Nodes (“Things”) Securityarchitecture Sensory Input Software Data Protection Secure Storage Trust Zone Secure Boot JTAG Protection Unique Key/Certificate Device Protection Processor Storage Secure Communication Key M anagem ent Secure OTA Secure Channel Data Protection Auto Onboarding M utual Authentication Device M anagem ent
  • 5. Slide 5AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC Device protection and trustedcode execution Unique, tamper-resistantIDinjected during the manufacturing process. ARTIKkeymanagementservice(KMS)and code signing service Secureover-the-air (OTA) updates Secure communications with otherdevices and the cloud TLS1.2industry-standard cryptographic algorithms Mutualauthentication and root of trust Securedevice registration (SDR) Secure JTAG Secure storage, secure file system,and secure element TheSamsungeMMC securefile system ARM®TrustZone Dataencrypted withruntime-generated key Tamper-resistantCommon Criteria EAL5 secure element Physicallyunclonable function (PUF)(ARTIK 053) *Not including020and030 ARTIK module ARTIK S-module Comments Deviceprotectionand trustedexecution KMSinfrastructureforcode signing Keymanagement service Code verificationkeyinHW Securekeystorage Secureboot(checksfor authorizedcode) Boot imageverification JTAGaccesslocked Lockout debugaccess Secure communications Per-deviceunique key and certificate Uniquelyidentifies device KeystoredinHWsecure element Securekeystorage PKIinfrastructure: mutual authenticaionofdeviceandcloud Devicetalksto authorizedcloudand vice versa Securestorage, secure file system, andsecure element SecureOS(separatesnormaland secureoperations) Hardwareenforced secure applicationsvia TEE LimitedsecuritylibAPI (3 API calls) Randomnumber generator, get certificateand signature Full securitylib API(27APIcalls) Keymanager, authentication,secure storage, encrypt/de- crypt Credential provisioning Add andmanage certificatesandkeyson device(andin secure element) Securestorage Encrypt datastoredon Flash End to End Security – Gateway & Nodes (“Things”)
  • 6. Slide 6AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC Cellular – Module Services Over-the-air updates are needed to guarantee the scalability and profitability of IoT solutions
  • 7. Slide 7AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC Cellular – Remote Updates Unprotected updates can lead to malicious software being installed in field devices, compromising your business and reputation Poorly programmed update campaigns can result in excessive data or energy consumption, defeating their initial purpose Managing thousands of device updates requires careful field campaign planning by customer care and service operation teams + + Campaign planning Airtime & energy cost Security threats Industrial IoT software management tools need to address these aspects specifically
  • 8. Slide 8AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC Cellular – Safe and efficient IoT Fleet Updates Update Release management ensures only safe and tested Cinterion firmware and software can be pushed out to the field Campaign planning, execution and verification tools that help operation teams manage thousands of updates effectively Smart campaigns guarantee updates are data-efficient (incremental) and only pushed to healthy end-points Trusted software and application execution allow only authorized software to be installed and executed Integrity & Source Verification Automated software deployment
  • 9. Slide 9AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC Cellular – Typical Dashboard Recently launched campaigns Close follow-up of campaign execution Error tracking and update retry option Map visualization of failed update attempts
  • 10. Slide 10AS9120 (prEN 9120:2016) / ISO 9001:2015 ISO 14001:2015 IECQ-CECC Anglia Components Ltd Sandall Road, Wisbech, PE13 2PS United Kingdom Tel: +44 (0)1945 47 47 47 www.anglia.com info@anglia.com