SynapShield
End to end IoT network security
Dynamic Security Key
End to end IoT network security
Dynamic Security Key
It is increasingly common with attacks on IoT networks, either to disrupt them or steal the information. They are also hijacked for use in attacking other networks or organisations.
Some IoT networks transport sensitive data such as power meter readings and control commands. This makes the network mission critical for the company that depends on it.
And finally, personal data is required by law to be protected from theft.
Eavesdropping, by listening to the radio channel
Inserting messages, possibly by using a rogue device to communicate
Flooding the network with garbage messages that uses up the devices’ computational resources and blocks normal traffic
Encrypting all messages end to end using the AES 256 bit method. A message is not decrypted until it has reached its final destination.
The AES encryption key is changed dynamically, similarly as in mobile phone networks, to avoid cracking.
Integrity check for all messages. All messages are calculated using the blockchain method SHA-2 256 bit hash. If the message text is changed, it will be discarded.
Authenticating the sending device. All modems and gateways transmit their unique ID when joining the network. The network ID is also used to make sure only devices intended for a particular network can join it.
Distributed denial of attacks: All messages not carrying the correct network ID or has erroneous routing information will be discarded. Devices will only process or retransmit messages intended for themselves.
SynapShield also protects the sensor database by strict authentication routines (login) to ensure data is only accessible to authorised human users or 3rd party applications.