There has been a continuous growth in the usage of IoT devices. These devices are subject to an increasing number of attacks which exploit their software vulnerabilities. We need a secure architectural design for managing and using cryptographic keys involved in both initial configuration (onboarding) and secure automatic updates of IoT devices to perform authenticated key management and digital signature. Low-level IoT devices (8-bit) have low computational capabilities and a small memory size and are challenged to carry out desktop and server-type public-key cryptographic operations, as needed for key establishment and authentication of software updates. We have designed and implemented a prototype to provide secure onboarding and update architecture and associated protocols for low-level IoT devices (8-bit). It uses elliptic curve cryptography (Curve25519), authenticated key establishment, and a known continuity-based key-locking mechanism that uses a public key embedded in a current software image to verify the signature on the software update. The design addresses the scenario of transfer of update authority, e.g., when a manufacturer or update provider ceases to provide ongoing software updates upon going out of business. i First and foremost, I would like to thank my supervisor Dr. Paul van Oorschot of Carleton University for his support, helpful guidance, insight and feedback on my research, which acted as a true encouragement for me throughout my thesis journey. Without his guidance, this thesis would not have been possible. I would also like to thank Dr. Anil Somayaji of Carleton University for his continuous help guidance and valuable comments. I would also like to thank members of the Carleton Computer Security Lab (CCSL), notably Christopher Bellman and Reza Samanfar, who helped a great deal by providing valuable feedback on my research.