IoT technology has numerous applications, ranging from gathering biometric data via wearable devices to controlling connected equipment via communication networks and cloud platforms.
Pictured is a low powered IoT temperature and humidity sensor.
The global Internet of Things (IoT) market was valued at USD 300.30 billion in 2021 and is projected to grow to 650.5 billion by 2026. An increase in smart city initiatives world wide, an increase in connected devices to drive the growth of IoT, and emerging 5G and 6G technologies to help IoT adoption globally would provide vast opportunities for IoT vendors.
However, as the number of connected smart devices grows, so does the need for data protection and privacy. IoT devices are particularly vulnerable to network attacks such as data thefts, phishing attacks, spoofing and denial of service attacks (DDoS attacks). These can lead to serious data breaches that can take businesses and governments a lot of money and effort to recover from.
The majority of IoT devices are resource constrained, beinglimited in CPU, memory, and power resources, especiallybecause a lot of them are powered by batteries. Theydo not have the same security mechanisms built into theiroperating systems as more advanced machines and computers.
To prevents third parties from accessing data while it’s transferred from one IoT device to another, we consider the End-to-End encryption (E2EE): the message is encrypted first at the application layer (by the sender) and it is encrypted a second time at the network layer (by the IoT server), since the IoT server doesn’t know the encryption key used in the application layer, only the sender and the receiver are able to decrypt and read the message.
Our partner All Things Encrypted offers software-oriented E2EE IoT data security and control, independent of the technology that you use to connect to your device.
We provide end to end protection between your devices and your environment, no matter where they are. Our approach applies to any IoT network and almost any device and data. We can operate on any network technology from Sigfox to 5G, on private or public networks, from cable to satellite, or with any sized payload and throughput.
We developed, implemented, and evaluated a lightweightE2EE software to reduce the flash memory usage (by factors of 10 times) and computing energy cost (by 25%) of cryptographic tools deployed in modern IoT devices.
The Beowulf cipher has been successfully adopted on a IoT Device, a temperature and humidity sensor by IQ Nexus, an IoT solutions provider in New Zealand.
With the increases of attacks on smart devices, the use of a light weight cipher is needed more than ever.
Download our document to find out more.
Contact us today to start your journey towards secure cyber solutions with Holmes Cyber Security Centre.
Our team is ready to provide personalised support and answer all your questions.