IoTAC

The Concept

The IoTAC – Security By Design IoT Development and Certificate Framework with Front-end Access Control – project aims to deliver a secure and privacy-friendly IoT architecture that will facilitate the development of more resilient IoT service environments. Our system, comprising of a secure gateway, runtime security applications and cloud-based service platforms, will provide comprehensive protection for service environments of various industry domain. The technology will not only protect new deployments but can also enhance the security level of legacy operations.

Read more

USPs outline

What is this solution offering that’s different?
Advanced security

The IoTAC architecture comprises high security level components and solutions like the use of chip cards, PKI encryption, root of trust, secure booting, audit logs and many more. Security is assured all through the design, implementation and operation phases.

Modular architecture

The IoTAC architecture comprises multiple hardware and software components which will allow flexible configuration options to support diverse service environments of various security levels. Underlying core features will be supported with optional add-ons.

Multi-layer approach

Security countermeasures will be implemented both at hardware- and at software-level, comprising a secure gateway, front-end access control, honeypots, checkpointing, AI&ML algorithms and a runtime monitoring system.

The IoTAC framework

The IoTAC framework comprises the Security Baseline as the foundation, the IoTAC Software Security by Design (SSD) principles and the Security Assurance Model (SAM) platform, which will unite in a formal Certification procedure exposed as a service.

Use Cases

Proof of domain independence 

Consumer

use case

Smart home

Industrial /

Commercial

use case

Terminal operation

Airborne

use case

Drone operation

Automated

Driving

use case

Automated car

Latest news

Mix of research updates, blog content and white papers
Insights

9 Important Security Requirements to Consider for IoT Systems

The Internet has been steadily growing since its birth back in the second half of the last century. This constant growth was driven by different trends in different epochs. The most recent trend is to connect all sorts of embedded devices to the Internet, including home entertainment systems, industry equipment,…
News

Connected-home Owners Underestimate their Vulnerability to Cyber Threats

Comcast, the largest broadband provider in the U.S. with 27 million Internet customer households, conducted a survey in September 2020 involving 1,000 US adults about their perceptions regarding cyber threats against their connected devices in their homes. 95% of survey respondents grossly underestimated the volume of attacks they face each…
Insights

Comprehensive Protection for Internet of Things Infrastructure: The Kaspersky IoT Secure Gateway β

The Internet of things (IoT) is changing the world right before our very eyes. It can make it safer and more convenient, help conserve resources and efficiently manage entire production lines. The IoT concept encompasses an enormous amount of devices, technologies, software, and data transmission protocols. However, the diversity of…

Newsletter

Stay in the know and receive all the latest updates straight to your inbox.