Partner:
CEA-LETI, France
Advanced Technology:
SECURE infrastructure for trusted IoT platform
Contact:
Romain Jayles
Raphael Collado
Email:
SECURE infrastructure for trusted IoT platform
Security infrastructure establishing an environment to isolate trusted code executed or data manipulation by an IoT platform from an untrusted world using STM secure elements STM32 and TPM with Linux.
Example of SECURE BOOT implementation using STM secure elements STM32 and TPM
SECURE BOOT ON THE SECURITY REFERENCE PLATFORM
EMBRACES
- Integration of a SECURE hardware module
- Integration of a trusted OS isolated from Linux with hardware mechanism
- Drivers and software bricks to drive the secured hardware module inside the trusted OS
- Interfaces between untrusted world and trusted world to drive the secure hardware module.
KEY PERFORMANCES
- The security hardware module accesses and sensitive data manipulation are hardware isolated from untrusted OS
- Trusted applications can be developed to have secure services interfacing with untrusted OS
WHAT’S NEW?
- Hardware isolation from an untrusted world for secure hardware module accesses
- Stack in trusted OS for hardware secure module accesses Bridge between untrusted OS and trusted world
Typical use cases
- Any application using a set of IoT devices to collect personal and/or critical data
- Support for IoT applications developers to secure their produc
- Smart factories
- Smart cities
- Energy production and distribution
- Healthcare IoT
- Home automation
- Automotive and smart transportation
- Drone swarms
- Predictive maintenance
Integration of a secure element on an IoT gateway (RPI) deployed in smart living environment for Ageing Well (H2020 Large Scale Pilot ACTIVAGE)
Further information can be found at
http://www.activageproject.eu/docs/downloads/ACTIVAGE%20PRIVACY%20&%20SECURITY%20BROCHURE.pdf