default banner

Secure Connectivity Solutions

With the rapid growth in adoption of IoT products in various application areas, communication between connected edge devices and some infrastructure is an important functionality, which enables a wide range of applications, such as transmitting large amounts of valuable data generated or collected by the devices to a cloud infrastructure, devices monitoring, or software updates.

To protect customer data, confidentiality and integrity, as well as the security of IoT devices and IoT infrastructure to which they are connected, it is of critical importance to use a secure connectivity solution during the entire lifecycle from key provisioning to firmware upgrades in the field.

More and more products, from consumer products such as connected smart speakers or weather stations, to a wide variety of environmental and industrial sensors, and connected cars, are using some kind of connection to cloud services.

Securyzr

Cloud-connected IoT can collect or generate all kinds of valuable data in edge devices, then the data is either fully processed in the edge device or directly transmitted to a trusted infrastructure where powerful processing can be performed.

Between the two extreme solutions of relying on edge processing or full remote processing in the cloud, there are a number of trade-offs, depending on the requirements of a given application, from battery lifetime, memory footprint or processing power of the edge device, to the available bandwidth of the communication link, or the size of the data to be transferred, and the latency of transmission, processing and decision.

Depending on the application and the type of data, it may be necessary to ensure its confidentiality and integrity, as well as its authentication. In areas where data tampering can impact the physical integrity of customers such as automotive applications, confidence in trusted data is a must.

Trusted infrastructure and secure cloud connectivity are also required to enable secure management of a fleet of devices, including their real time monitoring or on the air authentication and registration, lifecycle management and firmware upgrades.

Rather than implementing security patches as an afterthought, security by design is the cornerstone of IoT security, upon which a trusted infrastructure can be built and maintained. Such secure solutions must rely on secure established and recognized connectivity protocols and implement software security. 

Secure-IC provides its customers with several secure connectivity IPs which may be adapted to their need and market.

 

Secure-IC’s secure connectivity IP portfolio includes the following IPs:

  • Secure Connectivity Protocols:

    Secure Connectivity protocol IPs support several communication protocols such as IPSec, MACSec or TLS/DTLS. The throughput of theses IPs can be tailored to the customer’s needs and can reach up to 100Gbps.
    More information on Secure Connectivity Protocols

 

  • Software Cryptographic Library:

    Secure-IC is able to provide cryptographic algorithms implemented in hardware with Tunable Cryptography IP but also implemented in software thanks to Software Cryptographic Library. The Software Cryptographic Library supports many algorithms such as AES, ECC-based cryptography, RSA-based cryptography and hash&MAC functions. It can embed several attack mitigations such as protection against side-channel attack, fault injection attack or cache-timing attack.
    More information on Software Cryptographic Library

Contact