The Internet of Things will only stand up to its promise if it can be trusted.
The steady development of IoT based applications goes in pace with the development of more and more sophisticated cyber-attacks.
Distributed Denial of Services (DDoS), ransomware, data theft and other attacks are becoming increasingly ubiquitous and dangerous, causing billion dollar losses; Man-in-the-middle attacks on video surveillance cameras are almost common ground. These are just some examples of threats faced by IoT systems.
Consequences can be heavy:
> disrupted services
> Intrusion on users’ privacy and safety
WISeKey offers since more than 20 years tailor made security solutions for website, people, services and devices based on a scalable Public Key Infrastructure.
Our certificate Authorities, Security Brokers, management systems and tamper resistant secure microcontrollers are regularly audited and accredited with highest grade Webtrust and Common Criteria certifications.
Our framework brings trust to your IoT applications by applying device authentication through the use of digital certificates and building message protection through the use of standards proven secure messaging protocols.
The digital certificate and related private key are stored in your devices with the use of the optional tamper resistant secure elements VaultIC.
The Security Broker connected to your IoT platform performs the authentication and validation of the messages coming from the different IoT devices and transfers only trusted messages to the background applications.
It can be easily customized to integrate IoT platforms such as IBM Watson (https://www.wisekey.com/events/ibmthink2018/).
relies upon the proven ISTANA PKI platform, the advanced solution specifically tailored to match the needs of IoT. Using state-of-the-art cryptographic algorithms, the ISTANA PKI platform is designed to meet the highest standards to issue, manage and validate digital credentials for IoT, and is scalable to support environments with hundreds of millions of devices. Additionally, INeS features Entity Management (Identities, Group, Type, Role, Life Cycle, any custom attributes), Message Security Policy Management and Business Rules Management and it interfaces with both – the Cloud infrastructure and Business Applications.
The system can be installed on customer premises, or outsourced to WISeKey and located in one of our secure data centers in Switzerland, USA, India or China.
Secure Element: VaultIC
Digital certificates and associated cryptographic assets are used to identify and authenticate devices during their entire life. Only trusted devices can connect to secure networks. Digital certificates, for instance TLS certificates, can also be used to secure communication channels from devices to gateways/routers, and from gateways/routers to servers. These cryptographic assets are securely stored in WISeKey’s VaultIC range of tamper resistant secure elements.
VaultIC is a product family, ranging from tamper resistant Integrated Circuits to software vaults, to be used as a companion to the IoT-device host processor.
VaultIC chips feature a configurable cryptographic tool box for authentication, confidentiality and integrity, executed in a secure environment.
VaultIC embeds on-chip non-volatile tamper resistant data storage capabilities for keys, certificates and customer data.
The VaultIC chips’ low-power consumption profile make them a viable solution to meet the limited power budgets of IoT devices.
VaultIC comes with middleware enabling secure boot, secure firmware update for IoT devices and secure communication (TLS).
VaultIC offers the best digital security guaranteed by independent certifications:
VaultIC182 is a hardware secure microcontroller with embedded firmware designed to perform secure authentication of an IoT edge device. VaultIC182 features on chip secure data storage for critical credential like private crypto keys. VaultIC182 helsp protecting IoT edge devices against attacks at IoT device level.
Read More about WISeKey’ solution by downloading VaultIC 182
VaultIC 405 is a secure hardware microcontroller with embedded firmware designed to perform secure authentication, integrity and confidentiality. It can be used for secure authentication, Secure boot, secure communication between the edge device and back-end server, secure provisioning. It is a secure crypto module with on chip secure data storage for critical credential or specific customer data.
Read More about WISeKey’ solution by downloading VaultIC 405
VaultIC 407 is a secure hardware microcontroller with embedded firmware designed to perform secure authentication, integrity and confidentiality. It can be used for secure authentication, Secure boot, secure communication between the edge device and back-end server, secure provisioning. It features multiple end to end secure channels, based on both Symmetric Crypro (SCP03) and Asymmetric Crypto (SCP11). It is a secure crypto module with on chip secure data storage for critical credential or specific customer data.
Read More about WISeKey’ solution by downloading VaultIC 407
The development of Internet of Things (“IoT”), based on the collection and management of large amounts of data, can only happen if data can be trusted. To achieve this, the most important security functions to secure IoT are:
The use of proven technologies coming from Information Technology and the security market, adapted to the IoT, offer the best solutions to secure the IoT infrastructure.
Read More about WISeKey’ solution by downloading White Paper IoT Security Solutions
The 18th of September, OVH, “the number 3 internet hosting company in the world” has been faced the most massive DDOS attack. It has been resolved on the 23rd of September.DDOS (Distributed Denial of Service) attack is more and more common on the internet, on the 21st of October Dyn experienced a similar attack scenario. The issue was resolved 10 hours later. Dyn is providing web site name to dynamic IP address translation. If you want to access a network from internet, you need to translate the URL into an IP address which may change from time to time. This is what Domain Name System is solving.
These attacks are the largest ones reported so far.
Read More about WISeKey’ solution by downloading White Paper DDOS