When it comes to IoT device security we believe proper and robust authentication is the
corner stone of any software security stack to be further developed on the device. Before you
want to send data to or receive data from the sensors of a IoT device, before you want to
control its critical actuators to perform, sometimes even life defining operations, we believe
you first want to have strongly authenticated the device with which you believe you are
communicating or controlling. This is valid for the operational aspect of an IoT device during
its life-time, but equally important for the provisioning and decommissioning. Certificates
and PKI infrastructure appears to be the “go-to solution” for IoT device authentication, bu ...