- Support portal
- Evaluation Kits and partner products
u-blox Support
- Product documentation
Documentation
- About
- Sustainability
- Partners and Alliances
- Contact
About u-blox
- Investor relations
Investor relations
Technology
|
01 Oct 2021
The key to protecting your customers - and your business.
For all the value they deliver, IoT applications exist within an extremely hostile environment in which they are constantly under attack. For them to unleash their full potential, IoT security challenges must be addressed – from day one. Our five pillars of security offer a solid foundation for robust and secure connected solutions that protect businesses and end users against IoT security risks.
IoT security refers to the set of measures taken to secure IoT devices and the networks they are connected to. With ubiquitous connectivity come new risks. Once a nice-to-have feature, IoT security has become a foundational element in today’s connected applications.
Because they are exposed to the broader internet, IoT device developers must constantly be mindful of the following principles:
Safeguarding IoT devices, protecting data, and ensuring data transmission security has become paramount to building a sustainable business against growing IoT security threats. With robust end-to-end security measures in place, business can protect their revenues and, by protecting devices and sensitive data, mitigate costs associated with operational and reputational damage.
IoT devices are continually exposed to all manner of constantly evolving IoT security threats. The most common categories include:
Integrating the u-blox five pillars of security, our solutions, products, and services will help you protect your and your customers’ business in today’s connected world.
Secure boot ensures that any firmware running on an IoT device is authentic and has not been modified. Devices featuring secure boot will only boot and run trusted software issued by the original device manufacturer.
Fielded IoT typically require regular upgrades to add new feature and apply security patches against emerging vulnerabilities. Secure firmware updates ensures that only authenticated and validated updates can be carried out on the device.
With secure APIs and physical interfaces, debug access to devices is limited to authorized users and API use is subject to authentication. Data authenticity and integrity are protected into and out of the device.
Transport layer security offers standards-based cryptographic protocols for authentication and signed or encrypted communications with the server, protecting data in transit to prevent man-in-the-middle attacks in device-to-server communication.
IoT devices are vulnerable to deliberate RF interference. Advanced GNSS satellite signals, RF-signal processing, embedded software development, and data encryption make it possible to detect potential attacks on air interfaces and increase the robustness against GPS jamming and spoofing.