IMHOIT Products

IMHOIT Crypt IoT

The products IMHOIT Crypt IoT products have been designed to solve security issues in typical IoT installations by securing the following elements:

 

  • Sensorsincludes sensors, transducers, controllers and actuators mainly.
  • Communication protocolsused to connect each element of an IoT installation.
  • Embedded firmwareon each critical component, such as the crypto chips where they "initiate"security aspects.
  • Hardware: various types of hubs, edge computing, SCADA and others.

IMHOIT Crypt IoT is supported by IMHOIT SDSan innovative solution that supports an inviolable cryptographic management model, based on quantum entropy and secure and inaccessible storage of public and private keys.

used in the payload encryption and decryption processes. payload shared among the various nodes of the IoT network.

refers to the way in which the IoT network equipment is incorporated into the product. IMHOIT SDS product, leading to the initiation of securitization.

to be used in the symmetric encryption processes that the customer wishes to use (RSA, AES, DES, 3DES, or one of their own production).

Compliance with X.509 Standard for public key certificates.

Secure communication through SSL.

Power supply by rechargeable batteries, by power supply or solar panel (optional).

Repository with updates available and kept in reserve, in the computer's memory, already encrypted and ready to be used.

Use cases

 

Among its many uses, IMHOIT Crypt IoT is ideal for the following situations.

 

IoT data security and certification

 

  • for implementations with a communication layer in which payloads are circulating payloads without security added to the standard that the manufacturer makes available, or
  • for those cases in which the customer demands an audit of the source code of the firmware that manages a large part of his enterprise security and his supplier does not allow it, or
  • when there are no adequate upgrade policies, both for firmware and functional software that affects the customer's entire operations.

Traceability of the data captured by the IoT network, which we record in a fully transparent and completely transparent and automated, in the Blockchain network that best suits the client.

 

Securization of captured data with a certification initiated within the same IoT sensor network (read at the closest possible point to the source of the data, both for security and computational power to perform such tasks).

Pains that IMHOIT Crypt IoT solves

IMHOIT Crypt IoT was conceived, designed and implemented to prevent tampering at source of the data received by sensors in an IoT network.

The aim is to bring a protection mechanism as close as possible to the point of data capture or to the equipment responsible for executing certain actions resulting from the data received (controllers, actuators).

Number of attacks on IoT devices doubles every year

"During the first six months of 2021, Kaspersky(™) honeypots - software that mimics a vulnerable device - detected more than 1.5 billion attacks against IoT (Internet of Things) devices. This was twice as many as in the previous half-year." - Kaspersky.co.uk

https://www.kaspersky.es/about/press-releases/2021_el-numero-de-ataques-a-dispositivos-iot-se-duplica-en-un-ano

The security of devices in an IoT network is often overlooked, perhaps in part because of the false belief that "hardware" is a "physical" device.physicalare more secure than their "non-physical" counterparts.non-physical"or, to put it another way, software.

"On one occasion, hackers hacked into the thermostat of a casino's aquarium. Since the device was connected to the Internet, through it they were able to access the casino's database and made off with up to 10 GB of data." - Avast.com

https://www.avast.com/es-es/c-iot-security-risks