Partner:

CEA-LETI, France

Advanced Technology:

SECURE infrastructure for trusted IoT platform

Contact:

Romain Jayles
Raphael Collado

Email:

romain.jayles@cea.fr
raphael.collado@cea.fr

SECURE infrastructure for trusted IoT platform

Security infrastructure establishing an environment to isolate trusted code executed or data manipulation by an IoT platform from an untrusted world using STM secure elements STM32 and TPM with Linux.

Example of SECURE BOOT implementation using STM secure elements STM32 and TPM

SECURE BOOT ON THE SECURITY REFERENCE  PLATFORM

EMBRACES

  • Integration of a SECURE hardware module
  • Integration of a trusted OS isolated from Linux with hardware mechanism
  • Drivers and software bricks to drive the secured hardware module inside the trusted OS
  • Interfaces between untrusted world and trusted world to drive the secure hardware module.

KEY PERFORMANCES

  • The security hardware module accesses and sensitive data manipulation are hardware isolated from untrusted OS
  • Trusted applications can be developed to have secure services interfacing with untrusted OS

WHAT’S NEW?

  • Hardware isolation from an untrusted world for secure hardware module accesses
  • Stack in trusted OS for hardware secure module accesses Bridge between untrusted OS and trusted world

Typical use cases

  • Any application using a set of IoT devices to collect personal and/or critical data
  • Support for IoT applications developers to secure their produc
  • Smart factories
  • Smart cities
  • Energy production and distribution
  • Healthcare IoT
  • Home automation
  • Automotive and smart transportation
  • Drone swarms
  • Predictive maintenance

Integration of a secure element on an IoT gateway (RPI) deployed in smart living environment for Ageing Well (H2020 Large Scale Pilot ACTIVAGE)

Further information can be found at

http://www.activageproject.eu/docs/downloads/ACTIVAGE%20PRIVACY%20&%20SECURITY%20BROCHURE.pdf

http://www.leti-cea.com/cea-tech/leti/english/Pages/Applied-Research/Technology-Fields/cyber-security.aspx