Industrial IoT Gets New Security Option with Avnet TPM Module

Date Published: December, 13, 2017

Technology distributor Avnet has announced a new security peripheral module based on the TPM 2.0. This module is targeted to Industrial IoT applications, such as factory automation, smart grid and healthcare and will provide a hardware root of trust for platform integrity, remote attestation and cryptographic services.

The module is based on Infineon’s OPTIMA TPM that implements TCG’s international standard (link to http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html) TPM 2.0 standard.

TCG recently announced a work group to evolve trusted computing, including the TPM, for use in industrial IoT applications. The group has worked closely with the Industrial Internet Consortium and that group’s security framework (https://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB.pdf), which recognizes the TPM and trusted computing as strong security approaches.

TCG also has published guidance, created with input from the industry, on securing the IoT (link to https://trustedcomputinggroup.org/work-groups/internet-of-things/).

More info on the Avnet module can be found here: http://zedboard.org/product/trusted-platform-module-security-pmod

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More