33
1. When planning a secure IoT design, the first consideration must be the device use case. Security
comes with a cost. The level of security you apply depends on the device use case.
2. If applications are performing secure operations on the IoT device, they can do so by running secure
operations in a trusted execution environment on the IoT device. They can also do so by running the
application in a secure element.
KAMALJIT SINGH
System Architect, IDEMIA
KEY POINTS