About Us

Kudelski IoT Launched Secure IP

Kudelski IoT introduced the Secure IP portfolio, which provides semiconductor manufacturers with strong cryptographic capabilities when integrated into system-on-chip (SoC) products. Enterprises benefit from a diverse set of security services that are more powerfully integrated with hardware than software while also enabling compliance with most common industry security standards, such as NIST, FIPS, PSA, and SESIP Level 3 or higher.

Frédéric Thomas, CTO of Kudelski IoT, commented, “We see increasing regulation and demand for security in almost every IoT market, ranging from consumer IoT, automotive, industrial, telco, medical, and asset tracking. We foresee that regulation will require hardware IP in most SoC designs going forward, and through this launch, we are giving silicon manufacturers a head start on preparing for the coming wave of demand.”

Kudelski IoT Secure IP is a hardware security enclave that gives SoCs key features like a high-quality and robust random number generator, secure key storage, robust cryptographic algorithms, and countermeasures against side-channel attacks (SCA, DPA) and fault attacks (DFA). With a smaller footprint, it saves space in SoC designs and energy.

Secure IP also provides access to services and features that ensure the longevity and profitability of devices and solutions for SoC manufacturers, device manufacturers, and end users. It offers features like secure firmware over-the-air updates, remote feature authorization, advanced data encryption to ensure privacy, and zero-touch or in-field provisioning for secured and scalable operations.

In conjunction with Kudelski IoT keySTREAM, secure IP can be used to manage the device lifecycle and provide customers with a fully secure chip-to-cloud experience. Personalization, key provisioning in the factory and the field, secure firmware updates, and attestation are all part of the process, from IoT solution design to refurbishment. As a result, Kudelski IoT wholeheartedly supports the development of secure and long-lasting products that safeguard new business models, corporate reputation, and regulatory compliance.

Michela Menting, Digital Security Research Director at ABI Research, stated, “Silicon hardware-based security offers better protection from manipulation and interference than its software-based counterpart because it’s more difficult to alter or attack the physical device or data entry points.”

Read more Blogs:

Major Concerns of IoT Security in 2022

Senet and Eclypses Partners to Help Secure Business Infrastructure

Senet and Eclypses have announced a partnership to provide advanced FIPS 140-3 validated security solutions to the Internet of Things ecosystem. Senet customers can now purchase Eclypses’ enhanced digital security as an integrated component of Senet’s network services. Eclypses also provides IoT device manufacturers the option of enabling MTE security at the point of manufacture or via a firmware update.

Eclypses’ patented MTE technology is curated to meet the needs of highly scalable, low-power, widely dispersed IoT endpoints. It also provides additional security for critical infrastructure and critical business applications. MTE leverages the Eclypses Cryptographic Library (ECL) to offer enhanced end-to-end security capabilities such as endpoint connection verification and uniquely protected data packets with no change to the user experience and minimal impact on the system resources.

Bruce Chatterley, CEO of Senet stated, “Senet has a committed history of augmenting the already strong LoRaWAN security capabilities through integrations with world-leading security solution providers. With device and data security increasingly becoming a leading topic of discussion with utility, municipal, and large enterprise customers, we are pleased to be partnering with Eclypses to offer the latest innovations in security designed for highly scalable IoT solutions and environments.”

Eclypses takes a proactive approach to take IoT data security to the highest level in anticipation of all threats, unlike other solutions that stop monitoring. ECL (Eclypses Cryptographic Library) is a FIPS 140-3 cryptographic library that provides consistent security for all offerings across all platforms. MTE (MicroToken Exchange) is a Patented technology that uses ECL to randomize and replace data with random streams of values, and MKE (Managed Key Encryption) uses ECL to randomize and MTE-generated encryption keys are used to encrypt data.

David Gomes, COO of Eclypses, commented, “With billions of IoT devices already connected and billions more due to be deployed in the next few years, having a well-defined security strategy is a must for device manufacturers and network operators and end-users alike. Senet is an established leader in the LoRaWAN ecosystem, and we’re excited to be collaborating to deliver enhanced security options to one of the fastest-growing segments of the IoT market.”

Read more blogs:

Major Concerns of IoT Security in 2022

Major Concerns of IoT Security in 2022

IoT Security focuses on protecting connected devices and networks on the Internet of Things systems. The Internet of Things (IoT) is a network of physical objects outfitted with sensors, software, and other technologies that can communicate and exchange data with other devices and systems. IoT systems’ architecture consists of wireless networks, cloud databases for communication, sensors, data processing programs, and smart devices that are interconnected and interact closely with each other.

IoT Systems have equipped big industries and regular users with smart technologies to help ease their requirements. Industrial IoT (IIoT) is revolutionizing the manufacturing landscape with a network of connected machines, systems, and devices allowing manufacturers to plan, control, integrate, and analyze their processes in a more efficient manner.

With the IoT implementation, manufacturers can have potential opportunities to improve operations, enhance customer experience, and strengthen the supply chain connectivity and the data generated by it. Wireless IIoT sensor data is being used by organizations to predict and alert workers when a machine requires maintenance and eventually reduces costly breakdowns and repairs while increasing machine uptime.

GPS systems, RFID tags, and other wireless technologies are being leveraged to track the location of assets at any time with better efficiency.

According to Infosecurity Outlook Experts, “The term IoT is increasingly making its way into everyday use. However, the internet of things (IoT) has become so large that security development has had to keep up with the transforming environment.”

IoT Security is essential for data security, Smart devices gather a lot of sensitive data, including personally identifiable information. These sensitive data breaches can result in unpredictable damages.

Major Security Concerns in IoT

With increasing IoT implementations, users face many concerns regarding privacy and security. IoT systems are increasing exponentially in most of the industry vectors. Devices connected to IoT are growing at an ever-increasing rate daily. Autonomous and intelligent factories are becoming more and more connected in the industry.

Hyperconnectivity across platforms, networks, apps, and devices necessitates protection measures commensurate to the devices’ intelligence and behavior.

IoT security refers to the technology that protects linked devices, networks, and data. Interconnected computing devices, mechanical and digital equipment, objects, animals, and/or humans are all part of the IoT. Each “thing” has a unique identifier and the ability to transport data over a network for identification purposes autonomously. If devices are not properly safeguarded while connected to the internet, they are vulnerable to a wide range of threats.

Because of a series of high-profile cases involving the infiltration and attack of a more extensive network using a typical IoT device, there has been an increased focus on IoT security. Networks having IoT devices attached to them need to be safe. There are a wide variety of tactics, strategies, protocols, and activities that can be used to protect modern enterprises against ever-increasing IoT risks.

Why IoT security?

IoT security offers required measures to safeguard devices that are linked to the internet or a network. An ever-expanding range of applications has made the Internet of Things (IoT) an ever-expanding phrase. Everything from watches to thermostats to video gaming consoles can connect to the internet or other devices.

Internet of Things (IoT) security encompasses a wide range of approaches, strategies, and solutions to prevent these gadgets from being hacked. IoT devices are more vulnerable to hacks because of their inherent connectivity. Some of the key concerns are:

  • Software and Hardware vulnerabilities:

Smart IoT Devices have limited computing power and are resource-constrained, they cannot support powerful security functions and are more vulnerable. The IoT industry lacks the computational capacity for efficient built-in security and poor access control in IoT systems and a limited budget for proper testing and improved firmware security.

IoT systems lack regular patches and updates due to limited budgets and technical limitations. IoT Devices have poor protection from physical attacks and an attacker can get close enough to add their chip or hack the device using radio waves. Malicious actors can leverage vulnerabilities in IoT systems to install malware and steal valuable data.

For example, the use of vulnerable credentials like weak, recycled, and default passwords helps hackers to hack smart cameras and they can even communicate with victims remotely using the camera’s microphone and speakers.

  • Data Security:

All the devices connected to the internet have high chances of online exposure. These devices can unknowingly store and affect sensitive, technical, and even personal information. IoT devices have access to the financial information of their users also. When these devices have access to your credit card or banking information, they become an easy target for hackers.

Financial institutions that use IoT at work are at elevated risk of exposure and attack. IoT devices with sensitive financial information and weak security can put both businesses and customers at risk.

  • Ransomware:

Ransomware and malware are serious threats to IoT systems. Cybercriminals have leveraged malware to great extent in recent years. Devices with insufficient enterprise cybersecurity can become a target for ransomware, which encrypts and blocks access to users’ sensitive files. The real trouble begins when a hacker who infected the device with malware demands ransom money. These security threats could jeopardize wearable technology, healthcare trackers, and smart homes.

The rapid rise in the number of IoT devices is making the security issue volatile. However, because the majority of IoT information is stored in the cloud, this malware may not have valuable data to lock. Ransomware attacks have the potential to not only lock users out of IoT devices and related platforms but also to disable devices and steal users’ data.

IoT botnet malware is one of the most common threat actors because it is versatile and profitable for cybercriminals.  Botnets are networks of devices that run malicious bots and distribute malware. Botnets can infiltrate IoT networks and install ransomware, spyware, or other malware on secure devices, jeopardizing your financial and personal security.

  • Cyberattacks:

Cyberattacks on IoT systems have dangerous consequences as they can easily turn into physical ones like fraudulent withdrawal of money or misuse of personal information or data. Cyberattacks like Distributed denial-of-service (DDoS) attacks frequently leverage infected or hijacked IoT devices. These devices are used as an attack base to infect additional machines and hide malicious activity, or as an entry point for lateral movement within a corporate network.

Be it organizations or smart homes, all IoT systems are at equal risk of cyberattacks. IoT systems are used in various industries from finance to healthcare, and an attack on these systems can expose sensitive information or even endanger their health and safety.

Conclusion

The Internet of Things has the unique ability to affect both virtual and physical systems. Developing a secured and safe IoT environment is the need of the hour. Users must regularly check for updates and patches and be ready to adapt to the developing IoT security protocols. In this blog, we shed some light on the concerns of IoT system security, further aspects like solutions for IoT Security will be discussed in the upcoming series on this topic.

Read more blogs:

What is IoT Security?

Impinj Launched E910 Rain RFID for IoT Enterprises

Impinj recently unveiled the Impinj E910 RAIN RFID reader chip for next-generation enterprise-grade readers that can find and interact with many connected objects, including retail clothing, pallets, airline baggage, and automobile parts. The Impinj E910 reader chip provides the industry-leading performance, low power consumption, and user-friendliness required for loss prevention, inventory management, and supply-chain automation solutions.

Chris Diorio, Impinj co-founder, and CEO stated, “The Impinj E910 reader chip will shepherd in a new era of RAIN RFID applications that connect trillions of everyday items. The E910 is the most highly integrated, easy-to-use, and sensitive reader chip on the market today, unlocking enterprise RAIN RFID applications in retail, supply chain and logistics, automotive, aviation, and myriad other market segments and opportunities.”

The Impinj E910 offers the highest receive sensitivity for any reader chip, -94 dBm, allowing reader manufacturers to meet the speed and distance requirements of demanding RAIN RFID applications like fast-moving conveyors and high-bay warehouse rack systems.

The high-performance E910 simplifies IoT device development by expanding Impinj’s existing E family of reader chips, which includes the E710, E510, and E310. These chips, when combined, provide advantages over previous-generation Impinj Indy reader chips, including, RAIN RFID system designs that are up to 80% smaller and are ideal for small, next-generation readers and IoT devices.

It supports battery-powered, energy-efficient readers and IoT devices by lowering chip power consumption by 50%. Software and pin-compatible designs allow simple performance upgrades and design reuse across the E family of chips.

Impinj partners can accelerate new reader innovation with simple developer tools and a new Impinj R515 reader reference design. The reference design includes extensive documentation and engineering drawings to assist IoT device manufacturers in maximizing the capabilities of the Impinj E910 reader chip in their readers while also reducing time-to-market. The Impinj E910 is a step forward for the Impinj platform, which includes RAIN tag chips, reader chips, readers, and Impinj’s partner ecosystem.

Read more articles:

What is IoT Security?

Intertrust Launched New Features For IoT Devices

Intertrust Platform builds trust and protects users by connecting enterprise data operations and IoT devices through a single pane of glass interface. Intertrust Platform now includes two new critical business features for IoT and Web3.0 (Web3) environments.

The platform’s two major feature enhancements are Explicit Private Networking (XPN); Intertrust Platform’s XPN technology provides end-to-end security for data at rest as well as in transit from device to cloud and back. Data is always protected and processed in tamper-resistant, secure execution environments when using Intertrust XPN.

Token Rights Management (TRM); Intertrust Platform TRM is a ground-breaking distributed governance technology that enables distributed authentication and authorization systems. Intertrust TRM supports traditional data and DRM applications, NFT applications, and standards-based Digital Twins to ensure hardware device security.

Talal G. Shamoon, CEO of Intertrust commented, “Intertrust Platform with XPN and TRM provides a comprehensive solution for enterprises aiming to protect complex data operations and IoT devices while transitioning to Web3 and data-driven business models. With the new XPN and TRM features, Intertrust Platform transforms diverse, existing IT infrastructure into a secure interoperable system that turns “zero trust” networks into “full trust” environments.”

The platform enables organizations to make competing data operation systems along with allowing IoT devices to operate in a consistent, secure, and controlled manner. The Platform integrates authentication/authorization into the data access layer and acts as a layer on top of the existing data operations infrastructure. It gives businesses the flexibility to choose and securely run best-of-breed application solutions. As a result, AI, data analytics, and other processing solutions operate on the Platform as secure apps.

The Platform is being used in industry-specific applications such as energy, mobility, media, and entertainment, as well as in healthcare trials. Toolkits for vertical applications such as renewable energy, grid planning, home automation, and digital rights management are available from the company.

Bill Rosenblatt, President of GiantSteps Media Technology Strategies stated, “Organizations see the value of IoT applications but are often hesitant to adopt them due to security concerns. The combination of Intertrust XPN’s unique end-to-end trust capabilities and Intertrust’s legacy as both an innovator in trusted distributed computing and a reliable operator of trusted systems will give organizations the confidence to more fully realize the promise of IoT.”

Read more articles:

 IoT Security?

IoT Security – An Overview

The Internet of Things (IoT) is a network of physical objects or ”things” connected through the internet to transfer data using software, sensors and technology.

IoT security encompasses the processes, protocols and technologies to protect IoT devices and networks. It also includes devices that are not meant for network security, such as smart industrial machines, smart medical equipment, automobiles, entertainment gadgets and personal IoT gadgets like a fitness band or smartwatch that employees bring to work. IoT gadgets are being introduced into organizational and customers’ networks at a stunning rate. While IoT solutions are empowering and energizing new approaches to improve effectiveness, adaptability, and usefulness, they additionally carry a danger to the organization. IoT devices, which are frequently constructed without security, have become a new threat route for cyber criminals to improve their attacks.

Different Layers of IoT Security

Future IoT linked devices will have complicated levels of systems like hardware, firmware, and software functioning at various abstraction levels.  The constituents and actions of the layer are dependent on the layer underneath it. This establishes a security hierarchy and emphasizes the importance of having a solid foundation framework.  For example, the firmware relies on hardware and the operating system depends on firmware.

Standard Security framework

The unfortunate reality is that connected devices are possible targets for cyber attackers looking for unauthorised network access, illicit device control, or IoT users’ data theft. The devices from different organizations have different levels and types of securities that can result in unexpected security flaws and unsafe services. Hence, organizations developing IoT solution should collaborate and develop a basic Standard security framework.

Customer’s Trust

This is already proving to be true. Recent findings of security flaws in the new autopilot system of car models have prompted huge recalls and security improvement to some major automobile companies. The videos of hackers hacking software and controlling cars through poorly secured software systems were all over the news and social media. Users of IoT solutions are worried about the possible consequences of a cybersecurity compromise. It indicates that IoT security market will grow fast with many opportunities.

Customer’s Privacy

The Internet of Things (IoT) market is in the initial phase of growth. The Internet of Things (IoT) sector is quickly evolving and will go through numerous stages of development. Similarly, as the market evolves, issues about the privacy and security of customers will evolve. An IoT gadgets deals with personal information of customers, their purchase history, things they like (preferences), location and behaviour. Patients on IoT based healthcare system would want their personal real-time data to be sent to medical staff like doctors or nurses, not to healthcare insurance companies. As a result, security policies should be multidimensional in order to recognize and respond to potential market disruptions.

It is astonishing that most IoT users have been sluggish to adopt standard cyber security measures already available in the market. Less than 50% of organizations employing IoT claimed they have adopted security solutions like Identity and access management, firewall for DDoS protection, etc. Considering the ubiquity and importance of IoT devices in the future world controlling everything from household devices like lights, fans, ACs and other objects like car, organizations need to start implementing security measures as early as possible.