Conceptually, the IoT comprises large numbers of devices connected to the internet, collectively capturing and reporting huge quantities of data to contribute to larger man-made goals, without direct human intervention. As a system containing many parts, proper management of each throughout its lifecycle is essential to ensure the system’s reliability and longevity. Moreover, because this is the IoT, lifecycle management is also critical to ensure security.
To address each of these aspects, device lifecycle management should begin at the initial design and manufacturing stage and extend to cover procurement and distribution, configuration and connection, operation, and eventual decommissioning. The lifecycle of IoT devices can be described in five stages (Figure 1).
Design and Manufacturing
For the most part, typical embedded-systems design principles apply. However, designing IoT devices demands special focus on aspects such as connectivity, interoperability, regulatory compliance – to ensure adherence to standards regarding data protection and privacy – and, of course, security.

Figure 1: The device lifecycle process
With IoT devices, perhaps more than any other category, the phrase “baked in” has become synonymous with the approach required to ensuring each individual unit can be kept secure from the time it is manufactured to its end of life. Its meaning is that security should not be considered as an afterthought or an add-on feature but instead must be an integral part of the device's architecture and functionality. It begins with a secure-by-design approach that pays proper attention to security threats and effective defences from the early stages of development. This includes incorporating security features, implementing secure protocols, and conducting threat modelling and risk assessments.
Hardware-based security, leveraging components such as embedded secure elements (eSE) or trusted platform modules (TPMs), provides secure storage of cryptographic keys and credentials such as device identity, as well protecting boot processes and facilitating secure communication. In addition to benefiting from immutability, reliance on hardware components also overcomes the shortage of processing power, typical in IoT devices, that often prevents using complex software security algorithms.
Embedded security also encompasses the use of strong encryption protocols, such as Transport Layer Security (TLS), to ensure secure communication with other devices and backend systems.
Protecting firmware and software calls for the use of secure coding practices, with regular security testing and code reviews. Vulnerabilities must be swiftly addressed through patches and updates. It is also important to minimise device attack surfaces, by analysing and designing-out possible entry points or vulnerabilities and using secure memory management and input validation.
A mechanism for regular, secure firmware updates is also essential, to address security vulnerabilities and patch any security flaws. This usually requires a secure method for distribution and installation, such as over-the-air (OTA) updating with on-device firmware to check the authenticity and integrity of the code. Best practice is to check the code when the update is received and as part of secure boot-up each time the device restarts.
Supply-Chain Management
A comprehensive approach to device lifecycle management should also encompass supply-chain aspects such as the procurement of devices and testing against the specifications and standards for each, as well as logistics and distribution. This includes delivering IoT devices to various locations for deployment. As with manufacturing any other electronic devices, maintaining vendor relationships, quality control, and inventory management to avoid stock outages or excess inventory are important aspects of device management. Maintaining high standards of quality control prevents faulty or defective products reaching the market and ensures that IoT devices meet the specified standards.
Underlying everything, protecting the IoT devices and the data they contain – including intellectual property and any security credentials loaded at the time of manufacture - against malicious interference is extremely important throughout the entire supply chain.
One aspect that must be accounted for is unauthorized production. As an OEM, you typically want to be monitoring the actual number of devices that are effectively manufactured by your contracted partners. Making sure that the device is imprinted with a digital identity for which you or someone you trust controls the issuance is blocking unauthorized production attempts.
We understand that the IoT can be overwhelming, so if you need support with your next IoT project or IoT security in particular, why not get in touch with our experts? Our IoT, Wireless and Connectivity teams are on hand to help you with your next IoT challenge.
Learn MoreSecurity
Secure Provisioning
Services providing keys and certificate injection into Secure Elements or MCU for full end-to-end Security.

Security
Secure Library
Software Root of Trust integrated into any MCU/MPU used for crypto operations and key storage.

Service
See IoTConnect
The IoT can be overwhelming. You need to leverage new technologies like AI, deep learning and data mining to make the most of your investment. Let us help you.
