Products

Crypto IoT

IMHOIT Crypto IoT has been designed to solve security issues in typical IoT installations so that we secure the following elements:

  • Sensors: includes sensors, transducers, controllers and actuators mainly.
  • Communication protocols: used to connect each element of an IoT installation.
  • Embedded firmware: in each critical component, such as crypto chips where they "initiate" security aspects.
  • Hardware: various types of hubs, edge computing, SCADA and others.

 

Specifications

IMHOIT Crypto IoT is supported by IMHOIT SDS, an innovative solution that supports an inviolable cryptography management model, based on quantum entropy and secure and inaccessible storage of public and private keys.

 Among its most outstanding features we can name:

  • Secure (physical) storage of keys: used in the encryption and decryption processes of the payload shared among the various nodes of the IoT network.
  • Admission and management interface of the various nodes: refers to the way in which the IoT network equipment is incorporated into the IMHOIT SDS product leading to the start of securitization.
  • Provision of real random sequences (quantum entropy) to be used in the symmetric encryption processes that the client wishes to use (RSA, AES, DES, 3DES, or one of its own production).
  • Compliance with the X.509 Standard for public key certificates.
  • Secure communication through SSL.
  • Power supply by rechargeable batteries, by power supply or solar panel (optional).
  • Repository with updates available and kept in reserve, in the computer's memory, already encrypted and ready to be used.

Use cases

 Among its many uses, IMHOIT Crypto IoT is ideal for the following situations.

IoT data security and certification

  • for implementations with a communication layer in which payloads circulate without security added to the standard provided by the manufacturer, or
  • for those cases in which the customer demands an audit of the source code of the firmware that manages a large part of his enterprise security and his supplier does not allow it, or
  • when there are no adequate upgrade policies, both for firmware and functional software that affects the customer's entire operations.

 

Traceability of the data captured by the IoT network, which we record fully transparent and automated, in the Blockchain network that best suits the customer.

Securitization of captured data with a certification initiated within the same IoT sensor network (read at the closest possible point to the source of the data, both for security and computational power to perform such tasks).

Pains that IMHOIT Crypto IoT solves

IMHOIT Crypto IoT was conceived, designed and implemented to prevent tampering at source of the data received by the sensor in an IoT network.

The aim is to bring a protection mechanism as close as possible to the point of data capture or to the equipment responsible for executing certain actions resulting from the data received (controllers, actuators).

 

Number of attacks on IoT devices doubles every year

"During the first six months of 2021, Kaspersky(™) honeypots - software that mimics a vulnerable device - detected more than 1.5 billion attacks against IoT (Internet of Things) devices. This was twice as many as in the previous half-year." - Kaspersky.co.uk

https://www.kaspersky.es/about/press-releases/2021_el-numero-de-ataques-a-dispositivos-iot-se-duplica-en-un-ano

 

Security of devices in an IoT network is not often given due attention, perhaps in part because of the false belief that "physical" equipment is more secure than its "non-physical" counterparts or, in other words, software. 

 

"On one occasion, hackers hacked into the thermostat of a casino's aquarium. Since the device was connected to the Internet, through it they were able to access the casino's database and made off with up to 10 GB of data." - Avast.com

https://www.avast.com/es-es/c-iot-security-risks

Sectors

Projects

Stages