Next level security

Many layers of security are built throughout 

Security Features at a glance

3GPP/GSMA Security Protocols

NB IoT has passed security protocols by 3GPP/GMSA the organisations responsible for managing mobile networks globally.

All communications are running on HTTPs military grade 256 bit encryption between all the vertical applications 

RSA Chipset Security

The NB IoT module chipset included in our smart locks applies 2048 bit RSA encryption

IPSEC security layer

Between the telco's mobile network, and the IoT device management platform a layer of Internet Protocol Security (IPSEC) is provided.  

Fully Managed and standardized

NB-IoT is part of the mobile network with fully managed standardized security guaranteeing the integrity of all data running through it

VPN Security

The Telecommunication company provides a dedicated VPN for further security and reliability.

HTTPS military grade encryption

NB-IoT is a licenced spectrum

As regulated entities with spectrum licensees, mobile operators have to comply with a range of requirements established by the regulatory authorities in the markets in which they operate. In most countries, mobile operators now have long track records of keeping their networks secure, building trust among regulators, governments and policymakers.

Access control deserves the best security

Give your employees the security they need, backed by the encryption and high standards of mobile networks

Mobile Network Security

NB IoT is part of the 5G standards and operates on the telco's mobile networks globally. 

Highest quality standards

Telco's have spent over 30 years and billions of dollars perfecting their network security and standards.

Licenced IoT technology

Other IoT communication technologies are unlicensed, unregulated, uncontrolled and insecure.

Unprecedented Encryption

Military grade 256 bit encryption is running on all vertical layers between platforms, mobile networks and smartlocks 

How NB-IoT is secure by design

Unlike some forms of connectivity, Mobile IoT networks are carefully managed and secured by mobile operators. By supporting an array of security features and safeguards, Mobile IoT network operators counter security threats such as hijacking of devices by botnets and the hacking of sensitive data belonging to individuals or organisations.  Standardised by 3GPP, the two main Mobile IoT technologies – NB-IoT and LTE-M – are supported by large numbers of mobile operators and equipment suppliers, enabling the ecosystem to benefit from economies of scale and low production and deployment costs.

Secure communication channels

Mobile operators ensure that customer/user data is encrypted while travelling across their own infrastructure. In cases when the data is traversing a less secure environment (e.g. the Internet), mobile operators provide and manage secure connections using virtual private networks (VPNs) and secure private, access point names (APNs) dedicated to specific customers to keep their data communications isolated from other traffic.

Managed communications

For IoT applications, devices typically only need to communicate with a specific set of servers. We restrict the communication from this device to these specific servers, meaning a compromised device will be unable to communicate with any other destination, thus limiting any potential threat. Such restrictions are implemented, for example, using a whitelist of IP addresses, IP address ranges or URLs. 

Data over NAS

We use Data over NAS (DoNAS) which allows the network to transport user data within signalling messages. This feature transports data via the MME (mobility management entity) by encapsulating them in NAS (non-access stratum) signalling. DoNAS can be used to transport both IP and non-IP traffic. The customer/user data is encrypted and integrity protected using the same mechanism reserved for network signalling, thus ensuring similar levels of protection. 

Non-IP Data Delivery

NIDD is used in conjunction with DoNAS to allow a device to send data to the network without an IP stack, without an IP address, and without an IP header or transport header. NIDD can transport data using a Point-to-Point (PtP) Serving Gateway interface (SGi) tunnel to the application server or by using the service capability exposure function (SCEF). The SCEF provides a means to securely expose service and network capabilities through network application programming interfaces (APIs).

All other locking technology has been hacked.

More information for download

Ready to get smart access?

Contact Us

L1/1 Tonsley Blvrd, Tonsley 

 SA, Australia, 5042

About Us

Team

Contact Us

Press

Blog

Support

FAQ

NB-IoT Technology

Products

Connect with Us

  • Facebook
  • LinkedIn
  • Twitter
  • Instagram
  • YouTube

©2020 by Digital Keys. Legals.

Download our app

googleplaylogo.png