Skip to content
Inovasense
Embedded Security & IoT - Inovasense
Inovasense · Service
Last Updated: Feb 2026

Embedded Security & IoT

Hardware-rooted IoT security — Secure Elements, HSMs, and post-quantum crypto. Projects aligned with CRA, NIS2 & IEC 62443.

Embedded Security & IoT - Inovasense Service (EN)

Embedded Security & IoT — Managed End-to-End

What is Embedded Security?

Embedded Security involves integrating cryptographic protection directly into hardware using components like Secure Elements, HSMs, and TPMs. It establishes a hardware root of trust that protects devices from tampering, cloning, and cyberattacks, ensuring compliance with the EU Cyber Resilience Act and NIS2 Directive for critical infrastructure and IoT.

Embedded security is the practice of building cryptographic protection directly into hardware — using tamper-resistant Secure Elements, Hardware Security Modules (HSMs), and encrypted boot chains to establish a hardware root of trust. Unlike software-only security, hardware-rooted protection cannot be bypassed by malware, memory exploits, or remote code execution attacks.

Through our partner network, Inovasense manages IoT projects that are secure by design — targeting compliance with the EU Cyber Resilience Act (EU 2024/2847), NIS2 Directive (EU 2022/2555), IEC 62443 for industrial security, and ETSI EN 303 645 for consumer IoT.

Why Hardware Security Matters in 2026

The EU Cyber Resilience Act enters mandatory enforcement in 2027, requiring all products with digital elements sold in the EU to implement vulnerability handling, software bill of materials (SBOM), and 5-year security update commitments. Products classified as “critical” (network equipment, industrial controllers, smart meters) face third-party conformity assessment.

Hardware-rooted security is no longer a premium feature — it’s a regulatory requirement.

⚠ This is the only path to CRA and RED compliance.

We don't patch software — we implement physical Hardware Root of Trust with EAL6+ certification to guarantee your CE mark. A firmware update cannot add a Secure Element that doesn't exist on your board.

Book a Compliance Gap Analysis →
  • Tamper-resistant key storage — Cryptographic keys never leave the secure element; extracting them requires destructive physical analysis
  • Measured boot — Every firmware stage is cryptographically verified before execution, preventing rootkit persistence
  • Physical attack resistance — Active mesh shields, voltage glitch detectors, and light sensors detect and respond to physical intrusion attempts
  • Lifecycle security — Secure provisioning, key rotation, certificate management, and end-of-life decommissioning managed through hardware
  • Post-quantum readiness — Hybrid key exchange (ML-KEM + X25519) and digital signatures (ML-DSA) protecting against future quantum threats

Security Architecture Stack

Hardware Root of Trust

Projects integrate certified security ICs from leading European manufacturers (STMicroelectronics, Infineon, NXP) to ensure hardware sovereignty:

ComponentProductsCertificationPQC Ready
Secure ElementsSTMicroelectronics STSAFE-A110, Infineon OPTIGA Trust M, NXP EdgeLock SE050CC EAL6+Firmware upgrade path
TPM ModulesSTMicroelectronics ST33 (TPM 2.0), Infineon SLB 9672TCG 2.0, FIPS 140-3Yes
Java CardSTMicroelectronics ST31 / STPay, NXP JCOP4CC EAL6+, EMVCoApplet-level
Secure MCUsSTM32H5 / STM32U5 (TrustZone + ST-ONE), NXP LPC55SPSA Certified L3Library support
Secure EnclavesSTM32MP2 (Hardware Isolation), ARM CCAIsolation certifiedHardware-assisted

Cryptographic Implementation

  • Symmetric: AES-128/256-GCM (hardware accelerated), ChaCha20-Poly1305
  • Asymmetric: ECC P-256/P-384, Ed25519/Ed448, RSA-3072/4096
  • Post-Quantum (NIST standards): ML-KEM-768/1024 (key encapsulation), ML-DSA-65/87 (digital signatures), SLH-DSA (stateless hash-based signatures)
  • Hybrid schemes: X25519 + ML-KEM for TLS 1.3, ECDSA + ML-DSA for firmware signing
  • Hashing: SHA-256, SHA-3, SHAKE-256, HMAC for message authentication
  • Key management: HKDF derivation, X.509v3 certificate chains, PKCS#11 interfaces, DICE (Device Identifier Composition Engine)

Secure Boot & Firmware Protection

Secure boot implementations follow the ARM PSA (Platform Security Architecture) model:

  1. Immutable bootloader — Stored in ROM, cryptographically verifies the next stage using Ed25519 or ML-DSA
  2. Chain of trust — Each boot stage authenticates the next; root of trust anchored in hardware fuses
  3. Runtime integrity — Memory protection units (MPU) and TrustZone enforce process isolation
  4. Secure OTA updates — Signed firmware packages (SUIT manifest) with atomic rollback on verification failure
  5. SBOM integration — Automated Software Bill of Materials generation for CRA compliance

Java Card Application Development

Java Card is a secure execution environment running on certified Smart Card ICs (CC EAL6+), enabling tamper-resistant applet deployment for payment, identity, access control, and IoT authentication. Through our partner network, we deliver custom Java Card applications on STMicroelectronics ST31/STPay and NXP JCOP4 platforms, working with certified Smart Card integrators where required.

What We Deliver

  • Custom Applet Development — Secure applets in Java Card 3.1 for payment (EMVCo), transport ticketing, government eID, and corporate access control
  • Payment Solutions — EMV contact/contactless payment applets, tokenization, and STPay-based secure wallet implementations for fintech and banking
  • Identity & Access — PKI-based digital identity, FIDO2/WebAuthn authenticators, and X.509 certificate management on secure elements
  • IoT Device Authentication — Mutual TLS authentication using Java Card-hosted certificates, device attestation, and secure provisioning for fleet management
  • NFC & Contactless — ISO 14443 / ISO 7816 compliant applets for contactless transactions, building access, and smart city infrastructure

Platforms & Certification

PlatformTypeCertificationUse Cases
ST31 / STPay (STMicroelectronics)Secure Smart Card ICCC EAL6+, EMVCoPayment, transport, eID
NXP JCOP4Java Card OS on SECC EAL6+, FIDOIdentity, access control
Infineon SLE 78Security ControllerCC EAL6+Government ID, healthcare

All Java Card solutions include GlobalPlatform compliant secure channel provisioning, applet lifecycle management, and remote applet management (RAM) capabilities.

Wireless Connectivity for IoT

Projects target connectivity solutions matched to each application’s power, range, and bandwidth requirements:

ProtocolRangeData RatePowerBest For
BLE 5.4100m2 MbpsUltra-lowWearables, asset tags, PAwR
LoRaWAN 1.0.415km50 kbpsVery lowEnvironmental monitoring, metering
NB-IoT (Rel-17)Cellular250 kbpsLowWide-area asset tracking
Wi-Fi 7 (802.11be)50m5.8 GbpsMediumReal-time video, gateways
Thread 1.3/Matter30m250 kbpsLowSmart home/building, interop
5G RedCap (Rel-17)Cellular150 MbpsMediumIndustrial IoT, autonomous
DECT NR+ (2024)1km3 MbpsLowPrivate industrial mesh, non-cellular

Ultra-Low Power Design

IoT projects target multi-year battery life through:

  • Sleep mode optimization — Current consumption <500 nA in deep sleep with RTC wake
  • Duty cycling — Intelligent scheduling algorithms reduce active time to <0.1%
  • Energy harvesting — Solar (indoor/outdoor), thermoelectric, and vibration harvesting circuits
  • Power profiling — Actual current consumption is measured at every design stage using analyzers like Otii Arc and PPK2
  • Battery chemistry optimization — LiFePO4 for extreme temperature, solid-state cells for longevity, supercapacitor hybrid topologies

Compliance & Certification (2026)

RegulationEffectiveRequirementHow We Help
EU Cyber Resilience Act (EU 2024/2847)2027 mandatoryVulnerability handling, SBOM, 5-year updatesSecure-by-design architecture, automated SBOM, CRA technical file
NIS2 Directive (EU 2022/2555)Oct 2024Supply chain security for essential entitiesSecure development lifecycle, incident response plan
IEC 62443OngoingIndustrial automation securityZone/conduit model, SL-T assessment, SDL
ETSI EN 303 645OngoingConsumer IoT security baselineAll 13 provisions: no default passwords, secure storage, minimal attack surface
RED Delegated Act (2022/30)Aug 2025Cybersecurity for radio equipmentSecure boot, authenticated updates, network protection
GDPR Art. 25OngoingData protection by designPrivacy-preserving architecture, local processing, minimal data collection
EU AI Act (2024/1689)2025–2027AI system risk classificationConformity assessment support for edge AI-enabled IoT

All security architectures are designed and documented within the European Union. Standard deliverables include threat model documentation (STRIDE/DREAD), security test reports, SBOM, and compliance gap analyses.

Frequently Asked Questions

What is embedded security in IoT?

Embedded security in IoT means integrating cryptographic protection directly into hardware using Secure Elements, TPMs, and HSMs. Unlike software-only security, hardware-rooted protection cannot be bypassed by malware or remote attacks. Inovasense manages IoT projects with hardware root of trust compliant with the EU Cyber Resilience Act.

Why is hardware security important for IoT devices?

Software-only security can be bypassed. Hardware security provides a tamper-resistant root of trust that protects cryptographic keys, ensures secure boot, and prevents unauthorized firmware updates — essential for critical infrastructure and connected devices under the EU CRA and NIS2 Directive.

What is the EU Cyber Resilience Act?

The EU Cyber Resilience Act (CRA, EU 2024/2847) is EU legislation requiring all products with digital elements to meet cybersecurity requirements throughout their entire lifecycle, including vulnerability handling, SBOM, and 5-year security updates. It becomes mandatory in 2027.

Regulatory References (Authority Source)