Securing the Internet of Things

Root of Trust and Technology platform for IoT

iot-0ver-1520

The Internet of Things has the potential to change the way we work and even our daily lives. The ability to monitor and manage objects makes possible to enable a full spectrum of new solutions—to optimize systems and processes, save time for people and businesses, and improve quality of life… But such a enormous benefit brings also security risks which can’t be ignored. Fake objects interacting in networks, injection of misleading data in industrial setups, eavesdropping of confidential information… The inclusion of security techniques in the IoT is critical to enable such benefits while controlling the risks.

Root of Trust for IoT

Our unique Trust Model

IoT-Oiste

The Root of Trust (RoT) serves as a common trust anchor, which is recognized by the operating system (OS) and applications, to ensure the authenticity, confidentiality and integrity of on-line transactions. With the Cryptographic Root of Trust embedded on the device, together with it’s own unique identity, can secure the interactions among objects and between objects and other entities.

At the heart of this strategy is the OISTE-WISeKey Cryptographic Root of Trust which has been actively used since 1999 by over 2.6 billion desktop, browsers, mobile devices, SSL certificates and Internet of Things’ devices. The OISTE WISeKey Cryptographic Root of Trust is ubiquitous and universal, and a pioneer in the identification of objects.

www.oiste.org

CertifyID IoT Platform

WISeKey’s approach for IoT

IoT-security1
IoT-security2
IoT-security3
WISeKey provides an enhanced technology platform that combines our experience in PKI and certificate management solutions with innovative features that address the new needs of the Internet of Things. Open interfaces that allow to integrate the manufacturing process of the objects with the issuance of their identities, and programming interfaces that simplify the usage of the new identities when authenticating the connected objects and the data that is transmitted across the network. The full lifecycle of the objects, their identities and the data can be easily managed with the new IoT platform provided by WISeKey.
IoT-Architecture

Key points:

  • IoT platform can be “on premises” or offered as a Cloud Service
  • Full flexibility for the chosen Trust Model: from private PKI to SubCA of publicly trusted Root


 

Solutions to prevent IoT devices to be used for DDOS attacks

The 18th of September, OVH, “the number 3 internet hosting company in the world” has been faced the most massive DDOS attack. It has been resolved on the 23rd of September.

DDOS (Distributed Denial of Service) attack is more and more common on the internet, on the 21st of October Dyn experienced a similar attack scenario. The issue was resolved 10 hours later. Dyn is providing web site name to dynamic IP address translation. If you want to access a network from internet, you need to translate the URL into an IP address which may change from time to time. This is what Domain Name System is solving.

These attacks are the largest ones reported so far.

Read More about WISeKey’ solution by downloading White Paper DDOS

DDOS

BVLGARI DIAGONO MAGNESIUM CONCEPT WATCH

Carlos Moreira Presenting Strategic Partnership for WISeKey