23
1. Mechanisms typically used to ensure hardware identity and authenticity include a digital signature to verify that a
device code is valid, a digital certificate to verify digital communications with the device, and a MAC address that
uniquely identifies that device.
2. Securing the component supply chain is a critical part of ensuring the security of the IoT devices you build. It
begins with selecting a vendor; for many devices, this means working through a distributor and multiple vendors.
MOHAN KULKARNI
Product Manager, PMD Solutions
KEY POINTS