Embedded PKI Architectures for IoT Security

Public-key infrastructure on the open web has a comfortable set of assumptions: the relying party has a clock, memory is plentiful, the network is reachable, revocation lookups happen on demand. None of these hold reliably on a connected device. Embedded PKI is not "the same PKI on a smaller computer" — it is PKI under different assumptions, and getting it right is what makes IoT identity meaningful.

The assumptions break

Designing PKI for embedded systems starts with naming the assumptions that don't hold:

A workable hierarchy

Most embedded PKI deployments converge on a similar shape:

The hierarchy is not arbitrary. Each layer aligns with a real-world boundary — the offline root with the most trusted process; the manufacturing intermediate with a specific factory or batch; the product intermediate with a recall surface; the leaf with the device.

Where keys actually live

The leaf key is the one that matters operationally. It must be:

If the leaf key ever exists, even briefly, in a place that isn't the Secure Element, the rest of the PKI architecture is doing significantly less than it appears to.

Revocation under embedded constraints

Revocation is where embedded PKI most often differs from web PKI. Three workable patterns:

Short-lived leaves with offline issuance

Devices receive shorter-lived leaves and re-attest periodically through the back-end. Revocation collapses to "stop reissuing". This works only when the device can be expected to reach the back-end at reasonable cadence.

Status-on-demand with caching

Relying parties (the back-end, not the device) check status when they receive an assertion, with caching to keep the load reasonable. This shifts the revocation burden off the device entirely.

Per-product or per-batch revocation

Revoke at the intermediate level when an entire product run is compromised. Less surgical, but operationally workable when granularity isn't critical.

None of these are universally correct. The right answer depends on connectivity, lifetime, and how surgical revocation needs to be.

Crypto agility

Devices live longer than algorithms. A 15-year industrial deployment provisioned today will live through cryptographic transitions that have not yet been announced. Embedded PKI architectures should:

Manufacturing as part of the PKI

The single highest-risk PKI decision is how the leaf key first gets signed. If a casual manufacturing tool can produce a valid signature, the entire PKI is downstream of that tool's security posture. Manufacturing-time provisioning needs:

Common mistakes

Where this fits in the architecture

Embedded PKI is not standalone. It is the structural layer underneath identity, attestation, secure provisioning, and lifecycle. Each of those depends on a hierarchy that holds up under the constraints described here. For the surrounding architecture, see trust chain architecture; for attestation specifically, see Device Attestation.

Embedded PKI is mostly about being honest about which assumptions don't hold. The architectures that survive in the field are the ones that name those assumptions early and design around them.

Conclusion

PKI on connected devices is a different engineering problem from PKI on the open web. Treating it as the same problem is the most common reason embedded PKI deployments age badly. Architectures that account for clocks, memory, connectivity, lifetime, and manufacturing — and that put the leaf key inside a Secure Element — produce identity that can actually be trusted at fleet scale.

FAQ

Do IoT devices need their own PKI?

For any deployment beyond a single batch, yes — a per-device identity hierarchy is the only way to make per-device authentication meaningful at scale.

What's the role of the Secure Element in PKI?

It holds the leaf key under conditions where the key cannot be extracted in usable form, and performs the signing operations that make the leaf cert operationally useful.

How do you handle revocation offline?

Common patterns include short-lived leaves with periodic reissuance, status-on-demand at the relying party, and per-product or per-batch revocation. The right pattern is deployment-specific.

Embedded PKIIoTSecure ElementRevocationCrypto agility

Related capability: Trust chain architecture · IoT Security

Designing PKI for a connected fleet?

We can walk hierarchies, manufacturing logic, and revocation patterns with engineering teams.

Request Technical Discussion