The end-to-end security solution for robust device authentication on IoT networks
The Gemalto Trusted Key Manager authenticates IoT devices and secures data exchanges on both cellular and non-cellular networks. With a massive number of connected devices, the cyber-attack surface is increasing.
This new solution enables strong digital security for all IoT ecosystem players, through a simple and trustful mechanism of secure keys provisioning, remote credential activation and lifecycle management.
The Trusted Key Manager prevents unauthorized devices from joining the network, thus ensuring the integrity of IoT devices and data they exchange, and speeding up massive and secure IoT deployments.
1- End-to-End cyber-security for Advanced Metering Infrastructure
New players and prosumers are joining the energy ecosystem, deploying renewable energy assets that tie into evolving smart grids. As the ecosystem gets more complex and keeps expanding, so does the opportunity for cyber-attacks. Gemalto helps Utilities and meter vendors to secure their assets and ensure a complete credential lifecycle management, over long periods.
Check our Solution Overview:
End–to-end Security for Advanced Metering Infrastructures
2- The specific case of LoRaWAN™ networks
LoRaWAN™* , one of the leading LPWAN technologies, connect cost-sensitive, battery-operated things that don’t require high bandwidth and speed. It offers extreme power efficiency and long-range connectivity, making it ideal for devices deployed in hard-to-service locations and that need to operate for 10 years or more.
Strong digital security is a must-have for all ecosystems players leveraging LoRaWAN. Gemalto - sponsor member of the LoRa Alliance ™* - secures the LoRa networks thanks to its Trusted Key Manager.
The Gemalto Trusted Key Manager provides chip and module markers, device makers, network operators and service providers with an advanced solution that ensures the end-to-end security of IoT devices connecting over LoRa®* networks. The solution manages key provisioning and strong authentication on multiple levels, ensuring the integrity and confidentiality of data transferred over LoRa networks. It also allows seamless IoT device onboarding on any LoRa network. The solution can be deployed in cloud-based or in-house infrastructure.
How it works?
Using market-proven, standardized cryptography, the solution allows LoRa-based devices and LoRa networks to authenticate each other, ensuring a secure network´join process´. This automated and secure digital enrollment leverages a double key provisioning so that only authorized devices can connect to authorized networks. In addition, a second mutual authentication process between the device and the application server ensures complete data confidentiality, granting access only to entitled applications or solution providers.
For more information, visit our dedicated page: https://www.gemalto.com/m2m/solutions/trusted-key-manager-for-lora
IoT Device Makers
• Removes the burden of security provisioning, saving time and money
• Single device design allowing easy IoT device onboarding on any LoRa network and market
• Simplifies device credential lifecycle management through automated and secure network ´join process´
LoRa Network Operators:
• Simplifies device network onboarding, which is crucial when devices change ownership or country of operation, for instance
IoT Application servers and End Users:
• Ensures confidentiality and integrity of accessed data