- This topic has 0 replies, 1 voice, and was last updated 6 years, 8 months ago by .
Viewing 0 reply threads
Viewing 0 reply threads
- You must be logged in to reply to this topic.
› Forums › Security › News (Security) › Trusted Objects demonstrates end-to-end security from IoT edge devices to AWS
Tagged: AWS G17, EdgeFog_G7
Edge device-to-cloud seamless security is now facilitated for system integrators thanks to the projects Trusted Objects has just published on hackster.io website. These demonstrations are showing how to connect edge devices to AWS IoT, based on either LoRaWAN or TLS protocol. The projects objective is to securely provision edge device identifiers (LoRaWAN), digital certificates (TLS) and more generally various data related to each device to make them available in AWS cloud.
With this solution, the edge device will be automatically authenticated by the AWS servers during its whole life cycle and will communicate data securely from end to end.
The first project demonstrates how to secure a LoRaWAN node using Trusted Objects secure firmware into a Secure Element (SE), with Kerlink gateway, Actility servers and AWS IoT backend. The SE is based on a secure hardware platform designed by Idemia StarChip and is the root-of-trust to achieve end-to-end security, first by providing strong authentication between the LoRaWAN node and the gateway and, secondly, by encrypting/decrypting applicative data up to the servers and using HTTPS protocol between servers and AWS.
The second project implements a TLS protocol for end-to-end security between a device embedding a SE running on Trusted Objects secure firmware and AWS IoT. Trusted Objects secure firmware is enabling the SE to handle the full TLS stack, which consists in certificate-based mutual authentication with AWS IoT, secure session key establishment and encryption/decryption of messages between the device and AWS IoT. In this context, a secure communication between the device and AWS IoT is automatically established, ensuring end-to-end security.