Internet of Things (IoT)

As the Internet of Things (IoT) grows and affects more devices, securing the IoT is challenging but essential. To accelerate strong security for IoT, the IoT Sub Group provides guidance on how Trusted Computing can be used for securing IoT. Further, the IoT Sub Group works to improve TCG standards so that they are better adapted to the needs of IoT systems.

IoT systems are composed not only of devices (“Things”) but also of networks, supporting services, and storage. Thus, most TCG technologies have some place in the Internet of Things. Yet the IoT provides special challenges. Some IoT applications require especially low power or low cost devices. Many require devices that can be remotely and automatically managed and secured for many years or even decades. Trusted Computing provides essential tools for remote device management (e.g., secure key storage and remote attestation) but other areas are more challenging (e.g., low power).

Steve Hanna

Senior Principal, Infineon Technologies; Work Group Co-Chair

Steve Hanna is a Senior Principal at Infineon Technologies. He is co-chair of the Embedded Systems Work Group in the Trusted Computing Group (TCG) and a member of the Security Area Directorate in the Internet Engineering Task Force. Hanna also serves as the liaison from the TCG to the Industrial Internet Consortium. He is the author of several IETF and TCG standards and published papers, an inventor or co-inventor on 43 issued U.S. patents, and a regular speaker at industry events. He holds a Bachelor’s degree in Computer Science from Harvard University.

Sung Lee

Security Researcher, Intel Corporation; Work Group Co-Chair

Sung Lee is a Security Architect at Internet of Things Group, Intel, responsible for leading threat analysis and security architecture reviews for several IOTG products as well as researching security, privacy and trust issues for emerging architectures. Sung joined Intel as a Security Architect in 2013. Prior to Intel, she has held several roles over 20 years covering product & business development, research in various areas, standards & SW development. She has B.S., M.S., and Ph.D. degrees in Computer Science from University of Maryland, College Park.

Resources

Resource NameResource TypeResource Tag
Secure Embedded Platforms with Trusted Computing: Automotive and Other Systems in the Internet of Things Must Be ProtectedWhite PaperIoT, Embedded
Guidance for Securing IoT Using TCG TechnologyReference DocumentIoT, Embedded, Trusted Computing, Guidance
Architects Guide: IoT SecurityArchitect's GuideIoT, Embedded, Trusted Computing, Guidance
Resource Directory

Resource Directory

The Trusted Computing Group’s new search tool allows you to easily access our library of resources.

Membership

Join TCG

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

About TCG

About TCG

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing.

Search Now
Learn More
Read More