Book description
Designing Secure IoT devices with the Arm Platform Security Architecture and Cortex-M33 explains how to design and deploy secure IoT devices based on the Cortex-M23/M33 processor. The book is split into three parts. First, it introduces the Cortex-M33 and its architectural design and major processor peripherals. Second, it shows how to design secure software and secure communications to minimize the threat of both hardware and software hacking. And finally, it examines common IoT cloud systems and how to design and deploy a fleet of IoT devices. Example projects are provided for the Keil MDK-ARM and NXP LPCXpresso tool chains.
Since their inception, microcontrollers have been designed as functional devices with a CPU, memory and peripherals that can be programmed to accomplish a huge range of tasks. With the growth of internet connected devices and the Internet of Things (IoT), “plain old microcontrollers are no longer suitable as they lack the features necessary to create both a secure and functional device. The recent development by ARM of the Cortex M23 and M33 architecture is intended for today’s IoT world.
- Shows how to design secure software and secure communications using the ARM Cortex M33-based microcontrollers
- Explains how to write secure code to minimize vulnerabilities using the CERT-C coding standard
- Uses the mbedTLS library to implement modern cryptography
- Introduces the TrustZone security peripheral PSA security model and Trusted Firmware
- Legal requirements and reaching device certification with PSA Certified
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Foreword
- Chapter 1: Introduction
- Chapter 2: Arm platform security architecture
- Chapter 3: Development tools and device platform
- Chapter 4: Cryptography—The basics
-
Chapter 5: Cryptography—Secure communications
- Abstract
- Introduction
- Asymmetric ciphers
- Elliptic curve cryptography
- Message signing
- Using asymmetrical ciphers
- Man in the Middle
- Public key infrastructure
- X.509 certificates
- Certificate validation
- Certificate lifetime
- Certificate revocation list
- Certificate encoding
- Certificate authority selection
- Certificate chain
- Exercise: Creating X.509 certificates
- Putting it all together
- Exercise: TLS server authentication
- Conclusion
- Chapter 6: IoT networking and data formats
- Chapter 7: Using an IoT cloud service
- Chapter 8: Software attacks and threat modeling
- Chapter 9: Building a defense with the PSA security model
- Chapter 10: Device partitioning with TrustZone
- Chapter 11: The NXP LPC55S69 a reference IoT microcontroller
- Chapter 12: Trusted firmware
- Chapter 13: Trusted firmware secure services
- Chapter 14: The PSA Secure Bootloader
- Bibliography
- Index
Product information
- Title: Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33
- Author(s):
- Release date: April 2022
- Publisher(s): Newnes
- ISBN: 9780128214732
You might also like
book
Building Secure Firmware: Armoring the Foundation of the Platform
Use this book to build secure firmware. As operating systems and hypervisors have become successively more …
book
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Break down the misconceptions of the Internet of Things by examining the different security building blocks …
book
Building Embedded Systems: Programmable Hardware
Develop the software and hardware you never think about. We're talking about the nitty-gritty behind the …
book
Practical Internet of Things Security - Second Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building …