12. End-to-End Security for IoT

By Paul-Emmanuel Brun | Guillemette Massot

Downloaded: 763 times

Published: 30 Jun 2020

© 2020 Paul-Emmanuel Brun | Guillemette Massot


According to market forecasts, IoT products and services are spreading very quickly in all professional and mass-market usage scenarios in terms of revenues and volumes of devices and services. In the meantime, lots of pilots and commercial deployments are demonstrating the added value of IoT-based solutions in real scale, and in all market segments, from the transportation industry to the utility sector but also in smart building, factory of the future, or healthcare applications. The use of historical and live data in big data lakes will allow recognizing anomalies, implementing alert functions, calculating solutions and optimizations for a more efficient digitalized world. In order to build trustable services and solutions, devices information needs to be trusted. This can only be ensured if IoT systems are end to end protected, ensuring protection against corrupted third parties. Indeed, while state of-the-art IT communication protocols such as HTTPS ensure end-to-end security, many IoT communication protocols have strong constraints in terms of bandwidth, power, and computation capabilities that do not fit state-of-the-art security protocols. In this context, BRAIN-IoT project has tested an innovative approach to ensure end-to-end security on constrained protocols with limited impact on bandwidth and power consumption.