End to end IoT network security
Dynamic Security Key


Why so much security?​

It is increasingly common with attacks on IoT networks, either to disrupt them or steal the information. They are also hijacked for use in attacking other networks or organisations.

Some IoT networks transport sensitive data such as power meter readings and control commands. This makes the network mission critical for the company that depends on it.

And finally, personal data is required by law to be protected from theft.


Unauthorised reading of the data

Eavesdropping, by listening to the radio channel

Malicious changing of the data to cause disturbances

Inserting messages, possibly by using a rogue device to communicate

Disruption of the network operation

Flooding the network with garbage messages that uses up the devices’ computational resources and blocks normal traffic

SynapShield's protection capabilities


Encrypting all messages end to end using the AES 256 bit method. A message is not decrypted until it has reached its final destination.

Dynamic Security Key

The AES encryption key is changed dynamically, similarly as in mobile phone networks, to avoid cracking.

Integrity Check

Integrity check for all messages. All messages are calculated using the blockchain method SHA-2 256 bit hash. If the message text is changed, it will be discarded.


Authenticating the sending device. All modems and gateways transmit their unique ID when joining the network. The network ID is also used to make sure only devices intended for a particular network can join it.

Distributed Denial of Attacks

Distributed denial of attacks: All messages not carrying the correct network ID or has erroneous routing information will be discarded. Devices will only process or retransmit messages intended for themselves.

Data protection

SynapShield also protects the sensor database by strict authentication routines (login) to ensure data is only accessible to authorised human users or 3rd party applications.

Scroll to Top