As the Internet of Things (IoT) grows and affects more devices, securing the IoT is challenging but essential. To accelerate strong security for IoT, the IoT Sub Group provides guidance on how Trusted Computing can be used for securing IoT. Further, the IoT Sub Group works to improve TCG standards so that they are better adapted to the needs of IoT systems.
IoT systems are composed not only of devices (“Things”) but also of networks, supporting services, and storage. Thus, most TCG technologies have some place in the Internet of Things. Yet the IoT provides special challenges. Some IoT applications require especially low power or low cost devices. Many require devices that can be remotely and automatically managed and secured for many years or even decades. Trusted Computing provides essential tools for remote device management (e.g., secure key storage and remote attestation) but other areas are more challenging (e.g., low power).
Steve Hanna is a Senior Principal at Infineon Technologies. He is co-chair of the Embedded Systems Work Group in the Trusted Computing Group (TCG) and a member of the Security Area Directorate in the Internet Engineering Task Force. Hanna also serves as the liaison from the TCG to the Industrial Internet Consortium. He is the author of several IETF and TCG standards and published papers, an inventor or co-inventor on 43 issued U.S. patents, and a regular speaker at industry events. He holds a Bachelor’s degree in Computer Science from Harvard University.
Sung Lee is a Security Architect at Internet of Things Group, Intel, responsible for leading threat analysis and security architecture reviews for several IOTG products as well as researching security, privacy and trust issues for emerging architectures. Sung joined Intel as a Security Architect in 2013. Prior to Intel, she has held several roles over 20 years covering product & business development, research in various areas, standards & SW development. She has B.S., M.S., and Ph.D. degrees in Computer Science from University of Maryland, College Park.
|Guidance for Securing IoT Using TCG Technology|
|Architects Guide: IoT Security|
|TCG TPM 2.0 Library Profile for Automotive-Thin|
|Secure Embedded Platforms with Trusted Computing: Automotive and Other Systems in the Internet of Things Must Be Protected|
|TCG Guidance for Securing Resource- Constrained Devices|
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.