Skip to product information
1 of 1
Regular price £49.79 GBP
Regular price £57.95 GBP Sale price £49.79 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 10 days lead

Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33

Provides an overview of how to develop secure IoT devices using the Cortex-M33 and TrustZone-based microcontrollers

Trevor Martin (Author)

9780128214695, Elsevier Science

Paperback, published 29 April 2022

496 pages
23.5 x 19 x 3.1 cm, 1.2 kg

Designing Secure IoT devices with the Arm Platform Security Architecture and Cortex-M33 explains how to design and deploy secure IoT devices based on the Cortex-M23/M33 processor. The book is split into three parts. First, it introduces the Cortex-M33 and its architectural design and major processor peripherals. Second, it shows how to design secure software and secure communications to minimize the threat of both hardware and software hacking. And finally, it examines common IoT cloud systems and how to design and deploy a fleet of IoT devices. Example projects are provided for the Keil MDK-ARM and NXP LPCXpresso tool chains.

Since their inception, microcontrollers have been designed as functional devices with a CPU, memory and peripherals that can be programmed to accomplish a huge range of tasks. With the growth of internet connected devices and the Internet of Things (IoT), “plain old microcontrollers? are no longer suitable as they lack the features necessary to create both a secure and functional device. The recent development by ARM of the Cortex M23 and M33 architecture is intended for today’s IoT world.

1. Introduction 2. Arm Platform Security Architecture 3. Development Tools and Device Platform 4. Cryptography - The Basics 5. Cryptography - Secure Communications 6. IoT Networking and Data Formats 7. Using an IoT Cloud Service 8. Software Attacks and Threat Modeling 9. Building a Defence with the PSA Security Model 10. Device Partitioning with TrustZone 11. The NXP LPC55S69 A Reference IoT Microcontroller 12. Trusted Firmware 13. Trusted Firmware Secure Services 14. The PSA Secure Bootloader 15. Bibliography

Subject Areas: Computer science [UY]

View full details