Security will be a decisive factor in the success of the Internet of Things (IoT). However, ensuring the secure collection and transmission of IoT data remains a major challenge for this growing area.
Bootstrapping security graph

Currently, many IoT data integrity and authentication solutions rely on extending proprietary implementations from traditional machine-to-machine (M2M) systems. Other solutions borrow traditional web mechanisms like certificates that require additional infrastructure in order to be fully effective.

Managing authentication on a large scale is a challenge already successfully met by the telecommunications industry. Today, Generic Bootstrapping Architecture (GBA) technology supports device authentication and communication security at the transport layer in advanced cellular networks around the world. GBA leverages SIMs to create strong session keys between devices and data analysis systems. It enables operators to create symmetric encryption security, with the added value of having mutually authenticated both the device and its enterprise server.

This technology can now be extended to provide equally strong authentication and data integrity for the IoT. It is based on an existing, globally scalable infrastructure and can be built into every device. GBA is therefore the key to a new level of security for the billions of devices set to join the IoT.

Bootstrapping security – the key to Internet of Things authentication and data integrity