| With TS Defender, Trusted Objects and Secure-IC join forces to fill a gap in the security solutions for Industrial IoT
Trusted Objects, a specialist in security for the Internet of Things, and Secure IC, an expert in secure solutions for embedded systems, are proud to announce TS Defender, their joint solution that delivers an easy to implement and highly secure solution to tackle the most common physical attacks on IoT devices.
AIX EN PROVENCE and RENNES, FRANCE, November 12, 2018 – As the development of Industrial IoT is going to scale, security remains a critical challenge on the road. Until now, security options often remained either complex to implement or vulnerable to physical attacks. Today, TS Defender software libraries is filling the gap between strong security and ease of implementation to efficiently protect IoT ecosystems.
There are more evidences that entry level implementations of public domain cryptography routines are vulnerable to a wide range of physical attacks conducted on connected devices. TS Defender provides advanced protection against the most frequent massive and selective attacks on IoT devices. It consists in a series of C language libraries that can easily be implemented into the IoT host IC (like MCU or RF SoC), leading to a fast execution time associated with a limited code size. In addition, TS Defender can be updated during the product lifetime as it is compatible with FOTA (firmware update over the air) features implemented in the host IC.
Building upon years of intensive R&D from both Secure-IC and Trusted Objects, with a laser focus on end-to-end security from device to cloud, TS Defender includes cryptographic operations and connectivity protocols that provide strong resistance to the most common physical attacks.
The first version, called TS Defender-LoRaWAN, is a major step on the path to security improvement in any LoRaWAN-standard IoT device, implementing LoRaWAN security mechanisms with the connectivity protocol. TS Defender-LoRaWAN brings even higher security and allows IoT device developers to shorten their time to market thanks to an already qualified secure library, which remains compatible with the standard LoRaWAN software stack. In the next few months, TS Defender will be extended to other LPWAN and LAN security protocols.
Sami Anbouba, CEO of Trusted Objects, comments: “We are proud of this cooperation with Secure-IC on IoT security; TS Defender is combining in-depth expertise in security and connectivity from both companies. The easiness of TS Defender integration and its resistance to security attacks will definitively help IoT developers and users to accelerate the deployment of their solution.”
Hassan Triqui, CEO of Secure-IC, adds: “The security tests we have conducted confirm that TS Defender is efficiently preventing massive and selective security attacks on IoT devices. It is a major step in securing the Industrial IoT and I want to thank both teams for this impressive achievement.”
For more information, please visit Avnet Hall C5 Booth 101 Electronica.
About Trusted Objects
Trusted Objects is a leading independent player in the Secure IoT market, providing innovative solutions including software and embedded firmware, to dramatically enhance the security of connected devices. Trusted Objects solutions are fully optimized, certified and are positioned as the root of trust to meet the end-to-end security needs of the IoT.
Trusted Objects also delivers a set of services and systems including security assessment, personalization engine, keys and certificates management, fast prototyping to accelerate the deployment of comprehensive solutions that meet the highest security requirements.
Secure-IC develops trusted computing security technologies for embedded systems to protect them from malevolent attacks and cyber threats.
Our mission is to partner with our Clients throughout and beyond the IC design process to provide best-of breed security expertise, solutions, and technologies, for embedded systems and connected objects. It can be summarized in three words: Protect, Evaluate, and Service.
More information at www.secure-ic.com