Secure the IoT: Part 2, A Secure Boot, the \"Root of Trust\" for Embedded Devices

By: Yann Loisel

Abstract: This is the second app note in a two-pat series on ways to secure the IoT. This app note concentrates on a secure boot which is, in fact, the “root of trust” and the cornerstone of an electronic device’s trustworthiness. It demonstrates how device security can be conveniently implemented and how devices can even be updated in the field. The DeepCover® secure microcontrollers will serve as trust-enabling example devices to secure the IoT.