Secure your IoT devices with Beowulf cipher

IoT technology has numerous applications, ranging from gathering biometric data via wearable devices to controlling connected equipment via communication networks and cloud platforms.

Pictured is a low powered IoT temperature and humidity sensor.

The global Internet of Things (IoT) market was valued at USD 300.30 billion in 2021 and is projected to grow to 650.5 billion by 2026. An increase in smart city initiatives world wide, an increase in connected devices to drive the growth of IoT, and emerging 5G and 6G technologies to help IoT adoption globally would provide vast opportunities for IoT vendors.

IoT security challenges

However, as the number of connected smart devices grows, so does the need for data protection and privacy. IoT devices are particularly vulnerable to network attacks such as data thefts, phishing attacks, spoofing and denial of service attacks (DDoS attacks). These can lead to serious data breaches that can take businesses and governments a lot of money and effort to recover from.

The majority of IoT devices are resource constrained, beinglimited in CPU, memory, and power resources, especiallybecause a lot of them are powered by batteries. Theydo not have the same security mechanisms built into theiroperating systems as more advanced machines and computers.

End-to-End Encryption for IoT devices

To prevents third parties from accessing data while it’s transferred from one IoT device to another, we consider the End-to-End encryption (E2EE): the message is encrypted first at the application layer (by the sender) and it is encrypted a second time at the network layer (by the IoT server), since the IoT server doesn’t know the encryption key used in the application layer, only the sender and the receiver are able to decrypt and read the message.

Our partner All Things Encrypted offers software-oriented E2EE IoT data security and control, independent of the technology that you use to connect to your device.

Beowulf cipher

We provide end to end protection between your devices and your environment, no matter where they are. Our approach applies to any IoT network and almost any device and data. We can operate on any network technology from Sigfox to 5G, on private or public networks, from cable to satellite, or with any sized payload and throughput.

We developed, implemented, and evaluated a lightweightE2EE software to reduce the flash memory usage (by factors of 10 times) and computing energy cost (by 25%) of cryptographic tools deployed in modern IoT devices.

Real world results

The Beowulf cipher has been successfully adopted on a IoT Device, a temperature and humidity sensor by IQ Nexus, an IoT solutions provider in New Zealand.

With the increases of attacks on smart devices, the use of a light weight cipher is needed more than ever.

Download our document to find out more.

Download our brochure

Get in Touch with Us Today

Contact us today to start your journey towards secure cyber solutions with Holmes Cyber Security Centre.

Our team is ready to provide personalised support and answer all your questions.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.