IoT security architecture for achieving the highest security.




Secure Element
With the highest tamper resistance against local physical attacks, secure elements provide strong anti-counterfeiting protection. Besides, the reduced attack surface due to logical separation allows secure functions, such as attested logs to be supported. For our secure elements such as EdgeLock SE050, A71CH and A1006, we offer scalable provisioning processes that reduce effort and complexity to achieve a trusted supply chain.
Hardware Root of Trust
Communications to back-end systems for cloud services is rooted in the secure element. No secret data has to be passed between the main applications processor and the secure element as the cryptographic functions are performed in isolation.
Processor with security hardening
To maintain the integrity of the application during operation, NXP processors provide the technology to support the product life cycle. Secure boot ensures that only authenticated software will be run. Interfaces for debugging and flash storage are protected. Tamper cases are monitored and device operation is restricted if system tamper is detected.
Arm® Trustzone®
Processors with Arm Trustzone provide a level of isolation within the chip to logically separate trusted operations. This protection is the basis for protecting firmware updates, logging, and remote testing of the IoT End and Edge node devices.