Security: the basic need of IoT
Robust security solutions create trust in the digital world

Security solutions for IoT applications

Security solutions protect sensitive data, intellectual property and personal privacy

We may be able to connect to the Internet from any device or location – but one thing never changes: Security is key. To work, the IoT has to be secure. Infineon’s aim is to create trust in the digital world so that users, enterprises, and organizations can unleash the full potential of the IoT – safe in the knowledge that their personal data, sensitive information, and industrial IP remain safe and unchanged.

Security promotes trust in and between connected IoT devices and is a prerequisite for their mainstream adoption. Security solutions give “things” a trustworthy identity and enable the growth of new business models. They protect sensitive data, intellectual property and personal privacy, and can contribute significantly to public safety. Infineon’s security portfolio extends from hardware-based root of trust to trusted execution environments and secured boot. Infineon is in a position to offer personalization and injection of certificates and keys in a secured, certified environment. This makes security easy to implement while shortening development times – all without detracting from the ease of use.

Product & solution examples

Networks, servers and IT infrastructure function as the brain and backbone of any IoT system. Since information and communication technology (ICT) systems live from data flowing in and out, they are, by nature, vulnerable to attacks. The dynamic ICT infrastructure behind IoT therefore requires a system-level security solution to enable secured end-to-end communication. Embedded security solutions such as Trusted Platform Modules (TPM) answer the demand for reliable ICT security. To connect IoT devices securely at scale to the cloud and other IoT services and smart things, embedded security is key. Especially as more and more devices - millions in the meantime - are connected to the IoT, consumers and manufacturers need to be sure that the identity of each and every device is genuine and secured. Both, the identity and integrity of all systems in a cloud-connected system needs to be protected. Infineon provides all the necessary products and solutions for this necessary protection that is the very basis for secured cloud connectivity and essential to enable secured zero-touch provisioning and secured lifecyle management of IoT devices. How does a smart home differ from a regular home? A smart home is equipped with technologies that make our lives more convenient and energy efficient. But with the rise of connectivity it is important to secure all the smart devices within a smart home. Unprotected smart home devices are a very attractive target for attackers who could break into home networks, steal and misuse sensitive personal data and even gain unauthorized access to smart homes. Moreover, connected smart home devices can be misused for larger scale attacks, such as DDOS attacks, that can take down entire server networks. We offer the right, easy to implement security solutions for smart, always-secured homes. We meet the evolving security needs without compromising on convenience. Smart wearables and IoT devices are becoming increasingly popular as they accommodate more and more functions on smaller footprints. Our SECORA™ Connect family brings NFC security capabilities to smart wearables and accessories, enabling users to securely provision, store, select, and use multiple credentials such as payment cards and transport tickets. This complete turnkey solution allows smart wearable system designers with no security or antenna design experience to seamlessly integrate a very compact, ultra-low-power solution supporting various NFC-based applications. As door locks can be accessed from the public space, it is imperative that they are secured with a tamper-resistant hardware trust anchor. Infineon‘s OPTIGA™ Trust product family supports a host of important security features including mutual authentication, secured communication and secured firmware updates.