IoTAC

The Concept

The IoTAC – Security By Design IoT Development and Certificate Framework with Front-end Access Control – project aims to deliver a secure and privacy-friendly IoT architecture that will facilitate the development of more resilient IoT service environments. Our system, comprising of a secure gateway, runtime security applications and cloud-based service platforms, will provide comprehensive protection for service environments of various industry domains. The technology will not only protect new deployments but can also enhance the security level of legacy operations.

Read more

USPs outline

What is this solution offering that’s different?
Advanced security

The IoTAC architecture comprises high security level components and solutions like the use of chip cards, PKI encryption, root of trust, secure booting, audit logs and many more. Security is assured all through the design, implementation and operation phases.

Modular architecture

The IoTAC architecture comprises multiple hardware and software components which will allow flexible configuration options to support diverse service environments of various security levels. Underlying core features will be supported with optional add-ons.

Multi-layer approach

Security countermeasures will be implemented both at hardware- and at software-level, comprising a secure gateway, front-end access control, honeypots, checkpointing, AI&ML algorithms and a runtime monitoring system.

The IoTAC framework

The IoTAC framework comprises the Security Baseline as the foundation, the IoTAC Software Security by Design (SSD) principles and the Security Assurance Model (SAM) platform, which will unite in a formal Certification procedure exposed as a service.

Use Cases

Proof of domain independence 

Consumer

use case

Smart home

Industrial /

Commercial

use case

Prosumer cell

Airborne

use case

Drone operation

Automated

Driving

use case

Automated car

Latest news

Mix of research updates, blog content and white papers
Insights

Disposable identities, what are they?

The classical tools and theories of the international political economy and diplomacy were the product of and well suited for the analogue world, where old strategies built on resource scarcity and ‘real’ events with physical objects apply. As transportation was experiencing revolution with cars, roads and highways, becoming mainstream, it…
News

Global Platform and ioXt Alliance Memorandum of Understanding

Global Platform and the ioXt Alliance have signed a Memorandum of Understanding to collaborate on aligning IoT security schemes, help harmonize standards and reduce fragmentation across the cybersecurity industry. “By simplifying security evaluation, and reusing certified components, manufacturers and vendors are provided with assurances that products will be protected and meet…
Insights

IoTAC Software Security Evaluation Framework

Quantitative Security Assessment based on Static Analysis Software security was traditionally treated as an afterthought in the overall development cycle of software products, being introduced after the software product was implemented (or even used) mainly through the inclusion of external protection mechanisms (e.g., intrusion detection and prevention techniques). According to…

Newsletter

Stay in the know and receive all the latest updates straight to your inbox.