Menu

IoT FEATURE NEWS

Mocana Supports Trusted Platform Module

By

Mocana Corporation is a provider of mission-critical security solutions for industrial control systems and the Internet of Things (IoT). The company announced their support for the Trusted Platform Module (TPM) 2.0 to enable device manufacturers to more easily build products that meet the highest standards for cyber-security.

What does this technology use to ensure it secures important information properly? Used to secure billions of computer hardware and financial systems, TPM technology uses a unique secret key embedded into a microchip or firmware. With Mocana, IoT device manufacturers can more easily secure storage, communications, firmware updates and containerized applications.

“As the pace of cyber attacks on IoT and industrial systems increases, there is a critical need for stronger security on IoT devices,” said Srinivas Kumar, VP, engineering, Mocana. “TPM technology has been used broadly to prove the identity of a computer or financial transaction device. We are now enabling the latest TPM 2.0 feature set on IoT devices. This will significantly reduce the effort for our customers to leverage TPM technology and avoid reading the more than 3,000 pages of TPM technical documentation.”

The Trusted Platform Module (TPM) is an international standard for a secure crypto-processor. It is a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. The important standard was created by the Trusted Computing Group (TCG), a computer industry consortium. It was later standardized by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). In 2009 the two organizations merged together to form the ISO/IEC 11889.

Advanced Ciphers Support, which supports advanced ciphers including Elliptic Curve Cryptography (ECC) and 2 56 and 512-bit Secure Hash Algorithms (SHA) 2. Multiple ownership of keys separates owners for the TPM Endorsement Key (EK) by signing/attestation from the Storage Root Key (SRK) with support for Endorsement Hierarchies (EH) and Storage Hierarchies (SH). The support offers seeding and reseeding of a non-deterministic pseudorandom number generator with an entropy source internal to the TPM’s cryptographic boundary to ensure a high degree of randomness for key generation.

Also it includes support for Windows and Linux. These solutions are optimized for embedded systems running their own based operating systems. Pre-integrated support for multi-vendor of TCG TPM 1.2 and 2.0 specifications from Infineon, Nuvoton, and STMicro is also available.

Mocana’s support offers compliance with cyber-security standards, which is the only solution to meet the requirements for US NIST 800-63B AAL3. This is the highest level of authentication assurance, and support Proof of Possession of a secret for both Certificate Management over CMS (CMC) and the Enrollment of Secure Transport (EST).


Chrissie Cluney has been a correspondent for IoT Evolution World since 2015. She holds a degree in English with a concentration in writing from the College of Saint Elizabeth.

Edited by Ken Briodagh
SHARE THIS ARTICLE
Related Articles

When it Comes to IoT Innovations, Array of Things Continues to Achieve

By: Arti Loftus    10/17/2019

The Array of Things is a collaborative effort to collect real-time data on the urban environment, infrastructure, and activity for research and public…

Read More

IoT Time Podcast S.4 Ep.33 IT Contingency

By: Ken Briodagh    10/10/2019

In this episode of IoT Time Podcast, Ken Briodagh sits down James Woodyat, CEO, IT Contingency, to talk about how physical security can be enabled thr…

Read More

IIC and Fira Barcelona Put Women in Front at IoT Solutions World Congress

By: Juhi Fadia    10/4/2019

The fast-growing world of Industrial IoT is proof positive that women are contributing to innovation and growth in the Industrial IoT.

Read More

IoT Time Podcast S.4 Ep.32 ABB

By: Ken Briodagh    10/3/2019

In this episode of IoT Time Podcast, Ken Briodagh sits down with Rob Massoudi, SVP, Digital Transformation, ABB, to talk about the entirety of the IoT…

Read More

WBA & LoRa Alliance Explore New IoT Use Cases for Wi-Fi & LoRaWAN

By: Ken Briodagh    10/2/2019

According to a recent release, and as discussed on a recent IoT Time Podcast, IoT market players can now gain access to many new IoT use cases by comb…

Read More