Why a self-healing IoT security system is key to staying safe and connected

Date Published: June, 19, 2019

By Steve Hanna, Chair of Embedded Systems Work Group in the Trusted Computing Group (TCG)

Physical systems are becoming more and more networked from industrial to automotive applications and beyond, making Internet of Things (IoT) systems a prime target for attackers. Coupled with the prediction that the IoT will reach 50 billion connected devices by 2020, the race is on to efficiently protect these devices.

Attacks are now more sophisticated than ever and with varying levels of risk, it is important that the right solution is put in place for each individual environment. You wouldn’t put the same level of protection on a bank as you would a home and this is the same for IoT and embedded systems as well.

Staying protected
The work that we do at Trusted Computing Group (TCG) has been driven by the Trusted Platform Model (TPM) for more than a decade. In this time, the TPM has been the go-to solution for those looking to protect their embedded systems as it provides integrity measurements, health checks and authentication services. The chip can be implemented at different security levels depending on the requirements of the system and is equipped to protect even against sophisticated attacks.

IoT systems and other connected devices should not purely be trusted based on the brand or model; owners should have a confidence in the security that they are relying on. This confidence can be enhanced by the inclusion of the TPM, as it helps to provide the identity of the computer and potentially the owner, whilst also providing evidence of the health of the device.

Looking to the future
The next stage of protection will be adding a cyber resiliency system that can recognize when it has been infected, pinpoint the intruders, and get rid of their attacks. TCG is currently working on this and sees it as the next development in cyber security.

This next-generation cyber resiliency system can identify an intruder, actively deploy countermeasures and then become stronger, similar to the immune system of a human. This will be a key topic that we will be discussing at Embedded Technologies Expo & Conference.

Visit TCG at Embedded Technologies Expo & Conference
At this upcoming event, TCG member companies will demonstrate the IoT security that the TPM can offer. Taking place at booth #1832, demonstrations will feature Infineon and Wibu-Systems USA. The former will showcase how trusted computing can be used to boost protection against a variety of common attacks and the role TPMs play in industrial security systems.

Wibu-Systems will show how TPMs can be used in secure licensing and providing a device with a unique identity. These demonstrations will offer visitors to see how embedded systems and TPMs work best – securing industrial systems and ensuring the needed level of protection.

Alongside the demonstrations, we will also host a unique, in-depth training workshop on Wednesday, June 26 in room 231B. This will allow attendees to hear exclusive insight from embedded and IoT security experts on the specific ways to ensure the safety of the system, data and networks, as well as learn about the work being done to secure a cyber resiliency future.

If you are interested in attending Let’s Build in Security: A Workshop to Secure Embedded and IoT Systems, please register here.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More