For asset tracking, data authenticity is essential, as well as the secure local storage of collected data and an easy secure cloud onboarding. Since the device is usually battery operated, it is mandatory to use an efficient way to transmit data securely to the cloud, reducing the power consumed.
Connected health
Connected health requires confidentiality and authenticity to ensure that only the patient and the healthcare provider (or the doctor) can access sensitive data. Software and data tampering pose a huge risk for patient safety.
Industrial monitoring
Industrial monitoring applications require the capability to monitor both the working status of a machine and the real-time condition of the production line. To intervene properly before machine downtime occurs and to make real-time decisions, it is mandatory to always trust the data reported by the sensor to the cloud application, providing a reliable way to ensure the integrity and authenticity of the data.
Smart building and smart home
Smart building and smart home networks shall guarantee the confidentiality and authenticity of the data to protect customer privacy and securely transfer personal data. Additionally, it is crucial to securely share collected data across trusted stakeholders and the secure authentication of the devices to the cloud.
Telematics
Telematics IoT devices must ensure 24/7 availability of business operations as well as authenticity of devices. It is also mandatory to protect the safety of personnel and fleet through accurate and protected data. The main risks to address are denial of service, cloning of devices, jamming, and data thefts.
Metering
Metering applications want to protect billing revenues by ensuring the authenticity and integrity of end-user data; securely remote-control meters for safety and billing purposes, and establish trusted communication to transmits data securely and only to authorized servers.