The end-to-end security solution for robust device authentication on IoT networks
The Gemalto Trusted Key Manager authenticates IoT devices and secures data exchanges on both cellular and non-cellular networks. With a massive number of connected devices, the cyber-attack surface is increasing. This new solution enables strong digital security for all IoT ecosystem players, through a simple and trustful mechanism of secure keys provisioning, remote credential activation and lifecycle management.
The Trusted Key Manager prevents unauthorized devices from joining the network, thus ensuring the integrity of IoT devices and data they exchange, and speeding up secure IoT deployments.
The specific case of non-cellular LoRaWAN™ networks
New Low-Power, Wide Area Networks (LPWAN) are emerging, offering boundless and versatile connectivity options, for IoT use cases requiring low-power consumption, long-range connectivity and low bandwidth.
LoRaWAN™* , one of the leading LPWAN technologies, was developed to connect cost-sensitive, battery-operated things that don’t require high bandwidth and speed. It offers extreme power efficiency and long-range connectivity, making it ideal for devices deployed in hard-to-service locations and that need to operate for 10 years or more.
Strong digital security is a must-have for all ecosystems players leveraging LoRaWAN. Gemalto - sponsor member of the
LoRa Alliance ™* - secures the LoRa networks thanks to Trusted Key Manager.
The Gemalto Trusted Key Manager provides chip and module markers, device makers, network operators and service providers with an advanced solution that ensures the end-to-end security of IoT devices connecting over LoRa®* networks. The solution manages
key provisioning and strong authentication on multiple levels, ensuring the integrity and confidentiality of data transferred over LoRa networks. It also allows
seamless IoT device onboarding on any LoRa network. The solution can be deployed in cloud-based or in-house infrastructure.
How it works
Using market-proven, standardized cryptography, the solution allows LoRa-based devices and LoRa networks to authenticate each other, ensuring a secure network´join process´. This automated and secure digital enrollment leverages a double key provisioning so that only authorized devices can connect to authorized networks. In addition, a second mutual authentication process between the device and the application server ensures complete data confidentiality, granting access only to entitled applications or solution providers.
* LoRa, LoRaWAN and the LoRa Alliance are marks used under license from the LoRa Alliance.
The Key Benefits
Leveraging decades of experience successfully managing secure credential provisioning and authentication in the banking and telecom sectors, the Gemalto Trusted Key Manager simplifies security management and offers clear advantages to all LoRa ecosystem players:
IoT Device Makers:
- Removes the burden of security provisioning, saving time and money
- Single device design allowing easy IoT device onboarding on any LoRa network and market
- Simplifies device credential lifecycle management through automated and secure network ´join process´
LoRa Network Operators:
- Simplifies device network onboarding, which is crucial when devices change ownership or country of operation, for instance
IoT Application servers and End Users:
- Ensures confidentiality and integrity of accessed data
Gemalto key LoRaWAN ecosystem partners
LoRa Network Servers