Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Product List
Slide7

There are other limitations for TLS. It has no protection from rogue firmware or protection against cloned devices. There is no protection against impersonation of devices (commonly known as spoofing) or physical attacks. In addition, the new needs in the IoT market for supply chain or ecosystem management are impossible to do with the current software only implementation. It is not possible to do secure download/boot, the user can not authorize or identify devices, and it is not possible to certify compliance to specification and ecosystem requirements.

PTM Published on: 2016-09-30