32IoT SecurityJustifying your customers' trust through securing their privacyThe Internet of Things (IoT) is a newparadigm that’s changing the world. It couldmake our world safer, improve our health,save us time and money, reduce waste andadd a new dimension to production controland life in general.Cybersecurity has traditionally beenassociated with the security of personal data.In the IoT era, however, this has transformedinto the security of privacy. Violations ofuser privacy such as remote surveillance viasmart home cameras, multimedia or babymonitors; interference in the functioning ofhousehold devices; unexpected shutdownsand the failure of everyday services – all ofthis is unacceptable to the end user.At the same time, the Internet of Thingsprovides tremendous opportunities fordevice manufacturers (including hardwarecomponents and software), telecom serviceproviders and the systems integrationmarket. A lack of trust in IoT solutions amongend-users could block or significantlyslow down realization of these potentialopportunities. That’s why end-to-endsecurity of IoT solutions is a top priority forall those involved.As things stand, IOT edge devices and telecoms equipment provided to customers caneasily incorporate cybersecurity violations. Hardware may fail to control the integrity ofthe firmware, and devices are sometimes shipped with preinstalled passwords, includingadministrator passwords. Weak network security settings or the use of old and vulnerablesoftware can also be issues. Add to that a lack of software update processes, meaning thatvulnerable devices can work for years without updates, and it’s clearly just a matter of timebefore the device is successfully attacked.The principle of a chain of trust forms the basis for guaranteeing the secure functioning ofan IoT device. Including edge devices and infrastructure elements (gateways). This principlebegins with the use of a root of trust at hardware level.Guarantees of trust at device level