How to Make IoT Security Simpler


Everyone understands that security is critical to the growth of the IoT, and the current solutions fall broadly into one of two camps: retrofit or build it in. Although retrofitting is a necessary compromise in some cases, the ideal case is that all new solutions will come with embedded security measures like signal encryption and hardened edge devices. Enterprises and developers are calling for this change, and now, some vendors are looking to take the work out those decisions for OEMs by building it in at the component level.

“As more financial and personal interactions are done via mobile devices, security becomes even more important,” said Ken Wimberley, VP Product Manager from JP Morgan Chase. “Service providers and apps developers are looking for easier and more comprehensive ways of securing users’ data across all devices in a consistent way.”

Trustonic, a provider of hardware-enabled security for smart devices, has announced Trustonic Hybrid Protection (THP), which helps app developers to integrate advanced security capabilities onto devices. THP makes it easier for developers to design in security from the start, and to deploy these enhanced services on mobile and IoT devices. THP is designed to combine Trustonic’s hardware-enabled security solutions with software protection technologies licensed from whiteCryption.

“Trustonic has been a key driver in the evolution of security in the mobile market and more recently the emerging IoT space,” said Ben Cade, CEO, Trustonic. “Trustonic Hybrid Protection makes it simpler for apps developers to improve app security whilst being able to scale across a wide range of mobile and IoT devices.”

Taking another tack, Icon Labs, an embedded networking and security technology developer, has released its Floodgate Modbus Protocol Filtering (FMPF) product to add critical protection capabilities for Industrial IoT and RTOS-based devices to its existing security products. 

The FMPF provides what Icon says is a critical missing layer of security for Modbus/TCP devices by using deep packet inspection to enforce virtual network segmentation and to control packets processed based upon source network address, function code, and packet data contents.

“The Modbus/TCP protocol currently lacks any real security, making these devices sitting ducks for even moderately skilled hackers,” said Alan Grau, President, Icon Labs. “Several attempts to add security to Modbus/TCP have been proposed, but none provide a cost-effective solution for legacy devices while maintaining interoperability with the protocol standard.  Modbus packet filtering addresses this problem by enforcing policies and inserting a layer of control without changing the underlying protocol.”

Edited by Kyle Piscioniere

Editorial Director

Related Articles

A Move Toward Pervasive LoRaWAN Network Coverage

By: Arti Loftus    9/15/2021

Earlier this year, ABI Research found that the LoRaWAN protocol is the leading license-exempt low-power wide-area (LPWA) network technology addressing…

Read More

Tartabit Eases IoT Device Makers Azure Marketplace Access

By: Maurice Nagle    9/14/2021

Tartabit LLC announced two new services to its integration arsenal: Marketplace Accelerator (MPA) and the Plug and Play Accelerator (PnPA). Both are a…

Read More

Winners of the 2021 IoT Evolution Community Impact Awards Announced

By: TMCnet News    9/9/2021

TMC, a global, integrated media company helping clients build communities in print, in person and online, in conjunction with its partner Crossfire Me…

Read More

Rocket Lab Lands Multi-Launch Deal

By: Maurice Nagle    9/9/2021

Rocket Lab announced a Multi-Launch deal to deploy the entire satellite constellation for Kineis. The project includes 25 IoT satellites launched via …

Read More

5G Connect Future Program Taking Startup Applications

By: Maurice Nagle    9/1/2021

Earlier this year, the 5G Connected Future Program took flight. Created by the T-Mobile Accelerator, Curiosity Lab at Peachtree Corners and the Georgi…

Read More