Embedded Security for the IoT Image

Embedded Security for the IoT

Purchase

Actionable Benefits

  • Optimize IoT product portfolios with fit-for-purpose security hardware to create higher-value products.
  • Leverage latest security features to tie in IoT products with development tools and lifecycle management services for faster go-to-market and post-market customer stickiness.
  • Target the IoT markets where security is in growing demand with the most appropriate hardware technology.

Critical Questions Answered

  • What are the technical innovations in terms of security features for embedded IoT hardware?
  • How is secure IoT hardware being bundled with appropriate development tools and associated lifecycle management services?
  • What does the vendor ecosystem look like and what are the industry consortiums focusing on in terms of standards/technology development?

Research Highlights

  • Technology overview of IP for secure embedded IoT systems.
  • Form factor deep-dive on eSIM, NFC eSE, TPM, TEE, Authentication IC, Secure MCU, Secure microprocessors.
  • Quantitative forecasts on global shipments by technology type.

Who Should Read This?

  • Silicon IP and semiconductor companies.
  • IoT device manufacturers.
  • Cloud and IoT service providers.

Table of Contents

1. EXECUTIVE SUMMARY

2. ANCHORING TRUST IN HARDWARE

3. IP CORES

3.1. Technology
3.2. Vendors
3.3. Building a Secure Foundation

4. EMBEDDED HARDWARE

4.1. NFC eSE
4.2. eSIM
4.3. Authentication IC

5. SECURE MODULES AND PROCESSORS

5.1. TPM
5.2. TEE
5.3. MCU
5.4. Application Processor/MPU

6. CONCLUSIONS