• Home
  • Nieuws
  • Programma
  • Exposanten
    • Deelnemen als exposant
      • Deelnameformulier D&E event 2023
    • Mediapartners
  • Plattegrond
  • Locatie
  • Historie
    • Programma 2021
    • Programma 2020
    • Programma 2019
      • Foto impressie
    • Programma 2018
      • D&E Event NL
        • Partners NL
      • D&E Event BE
        • Conference 2018
        • Exhibitors 2018
        • Exhibition Center
        • Partners BE
    • D&E NL 2017
      • Programma NL 2017
      • Exposanten 2017
    • D&E BE 2017
      • Conference BE 2017
      • Exhibitors 2017
    • D&E 2016
      • Presentaties en programma 2016
      • Exposanten 2016
    • D&E 2015
      • Presentaties en programma 2015
    • D&E 2014
      • Exposanten 2014
      • Presentaties en programma 2014
    • D&E 2013
      • Exposanten 2013
      • Presentaties en programma 2013
      • D&E Event – 9 oktober 2013
  • Contact
  • Account
    • Login
  • Login
  • Zoeken

D&E Event

Design Automation & Embedded Systems

Secure M2M on the SIM

10 september 2014 door Aspider M2M

AspiderASPIDER has developed a true end-to-end security solution for M2M communications that employs state-ofthe-art cryptography technology. Cryptography is the foundation of data security and it is employed in e-commerce activities such as online shopping, stock trading, and banking. The current version supports symmetrickey cryptography; public-key asymmetric cryptography will be enabled at a later date. As far as we know, Aspider is the first company to employ this robust technology for M2M security.

The security keys that ASPIDER generates, using an ultra-secure process, are stored in transparent files that are embedded in the SIMs. One subset of the security keys is open and accessible; another is only accessible using a PIN code. The M2M modem retrieves keys from the SIM , sends encrypted data to the server, which decrypts the data using the same key. The same encryption/description process is also used to send data to the modem. Ultimately the solution provides four security levels when using symmetric cryptography. (1) The Advanced Encryption Standard (AES) is employed for encryption. (2) The Message Authentication Code (MAC) enables data integrity to be secured. (3) Additional authentication can be provided by verifying the identity of the communicating entities. And (4) Adding Session Data (SD ) ensures that messages are secured and cannot be reused by an attacker at a later date. All four are required in order to ensure end-to-end security.

In asymmetric public key cryptography (PKI) one key is used to encrypt the information and a second key decrypts the information. A user can encrypt a short-lived session key using the communicating party’s public key and simply send out the encrypted key. PKC ensures that only the holder of the corresponding private key can decrypt and obtain the session key.

Encrypting data at the application level is an up-coming development. This enables the protection of sensitive data and the control of access to be provided in a finegrained way. The application is the obvious place to encrypt and decrypt data because the application knows exactly which data is sensitive and can apply protection selectively. Earlier this year ASPIDER M2M became part of the Wyless Group. Wyless is the global leader in M2M managed services and as such the company employs a comprehensive portfolio of security mechanisms, which include private IP addresses, IPsec tunnels, the Point-to-Point Tunneling Protocol plus clientserver and IPsec site- to- site VPNs.

Currently the company has agreements with 19 leading MNOs and a single Wyless SIM provides global connectivity. Therefore customers will now be able to add even more security by employing ASPIDER ’s end-to-end cryptography solution. However, I should like to emphasize that our solution delivers ultra-robust security in its own right and it is decoupled from the parent company’s managed services offer. At one time M2M solutions were thought to be secure because they were obscure, but M2M has moved on. The Heartbleed security vulnerability issue, for example, allows any sensitive data that would normally be protected by the SS L/TLS encryption, even private keys, to be stolen. Heartbleed did not impact any Wyless technical resources, but it did indicate that any device, host, or resource could, eventually, be exposed to a zero-day vulnerability. Security is a moving target – one that’s always in our sights.

For more information, please contact Aspider M2M

Categorie: exposant, lid, Nieuws Tagged: Aspider, Aspider M2M, m2m, Sim

Gerelateerd:

  • Guide to select a perfect media Converter
  • Gelezen in Elektronica nr 8/9 ’17: PIFA voor draadloze systemen
  • TOP-electronics and Quectel launches ~ IoT / M2M-optimized Cat.1 LTE Module – EG91
    TOP-electronics and Quectel launches ~ IoT / M2M-optimized Cat.1 LTE Module – EG91
  • Succes met IoT, businesscase & technologie

Aspider M2M

ASPIDER M2M ( een bedrijf van Wyless) is leverancier van M2M / IoT oplossingen voor mobiele operators, MVNO’s, Resellers en eindklanten.

Onze producten en diensten worden ingezet in verscheidene markten en voor veel diverse toepassingen. Kleinbedrijf of multinational, elke klant heeft zijn specifieke redenen om voor ons te kiezen.

Dankzij een eigen core network kunnen wij  onze klanten een flexibele en netwerkonafhandelijke M2M-dienstverlening bieden. Voor een volledig overzicht van de voordelen verwijzen we u graag naar onze website.

 

 

Email: thijs.vandesande@aspider.com

Website: http://aspiderm2m.nl/

Privacy statement
Disclaimer
Cookies

Copyright © 2023 · Onderdeel van FHI ·