Internet of Things (IoT)

Internet of Things (IoT)

As the Internet of Things (IoT) grows and affects more devices, securing the IoT is challenging but essential. To accelerate strong security for IoT, the IoT Sub Group provides guidance on how Trusted Computing can be used for securing IoT. Further, the IoT Sub Group works to improve TCG standards so that they are better adapted to the needs of IoT systems.

IoT systems are composed not only of devices (“Things”) but also of networks, supporting services, and storage. Thus, most TCG technologies have some place in the Internet of Things. Yet the IoT provides special challenges. Some IoT applications require especially low power or low cost devices. Many require devices that can be remotely and automatically managed and secured for many years or even decades. Trusted Computing provides essential tools for remote device management (e.g., secure key storage and remote attestation) but other areas are more challenging (e.g., low power).


Steve Hanna

Senior Principal, Infineon Technologies; Work Group Co-Chair

Steve Hanna is a Senior Principal at Infineon Technologies. He is co-chair of the Embedded Systems Work Group in the Trusted Computing Group (TCG) and a member of the Security Area Directorate in the Internet Engineering Task Force. Hanna also serves as the liaison from the TCG to the Industrial Internet Consortium. He is the author of several IETF and TCG standards and published papers, an inventor or co-inventor on 43 issued U.S. patents, and a regular speaker at industry events. He holds a Bachelor’s degree in Computer Science from Harvard University.

Sung Lee

Security Researcher, Intel Corporation; Work Group Co-Chair

Sung Lee is a Security Architect at Internet of Things Group, Intel, responsible for leading threat analysis and security architecture reviews for several IOTG products as well as researching security, privacy and trust issues for emerging architectures. Sung joined Intel as a Security Architect in 2013. Prior to Intel, she has held several roles over 20 years covering product & business development, research in various areas, standards & SW development. She has B.S., M.S., and Ph.D. degrees in Computer Science from University of Maryland, College Park.


Resources

Resource Name
Guidance for Securing IoT Using TCG Technology
Architects Guide: IoT Security
TCG TPM 2.0 Library Profile for Automotive-Thin
Secure Embedded Platforms with Trusted Computing: Automotive and Other Systems in the Internet of Things Must Be Protected
TCG Guidance for Securing Resource- Constrained Devices