Security Features at a glance
3GPP/GSMA Security Protocols
NB IoT has passed security protocols by 3GPP/GMSA the organisations responsible for managing mobile networks globally.
All communications are running on HTTPs military grade 256 bit encryption between all the vertical applications
RSA Chipset Security
The NB IoT module chipset included in our smart locks applies 2048 bit RSA encryption
IPSEC security layer
Between the telco's mobile network, and the IoT device management platform a layer of Internet Protocol Security (IPSEC) is provided.
Fully Managed and standardized
NB-IoT is part of the mobile network with fully managed standardized security guaranteeing the integrity of all data running through it
The Telecommunication company provides a dedicated VPN for further security and reliability.
HTTPS military grade encryption
NB-IoT is a licenced spectrum
As regulated entities with spectrum licensees, mobile operators have to comply with a range of requirements established by the regulatory authorities in the markets in which they operate. In most countries, mobile operators now have long track records of keeping their networks secure, building trust among regulators, governments and policymakers.
Access control deserves the best security
Give your employees the security they need, backed by the encryption and high standards of mobile networks
Mobile Network Security
NB IoT is part of the 5G standards and operates on the telco's mobile networks globally.
Highest quality standards
Telco's have spent over 30 years and billions of dollars perfecting their network security and standards.
Licenced IoT technology
Other IoT communication technologies are unlicensed, unregulated, uncontrolled and insecure.
Military grade 256 bit encryption is running on all vertical layers between platforms, mobile networks and smartlocks
How NB-IoT is secure by design
Unlike some forms of connectivity, Mobile IoT networks are carefully managed and secured by mobile operators. By supporting an array of security features and safeguards, Mobile IoT network operators counter security threats such as hijacking of devices by botnets and the hacking of sensitive data belonging to individuals or organisations. Standardised by 3GPP, the two main Mobile IoT technologies – NB-IoT and LTE-M – are supported by large numbers of mobile operators and equipment suppliers, enabling the ecosystem to benefit from economies of scale and low production and deployment costs.
Secure communication channels
Mobile operators ensure that customer/user data is encrypted while travelling across their own infrastructure. In cases when the data is traversing a less secure environment (e.g. the Internet), mobile operators provide and manage secure connections using virtual private networks (VPNs) and secure private, access point names (APNs) dedicated to specific customers to keep their data communications isolated from other traffic.
For IoT applications, devices typically only need to communicate with a specific set of servers. We restrict the communication from this device to these specific servers, meaning a compromised device will be unable to communicate with any other destination, thus limiting any potential threat. Such restrictions are implemented, for example, using a whitelist of IP addresses, IP address ranges or URLs.
Data over NAS
We use Data over NAS (DoNAS) which allows the network to transport user data within signalling messages. This feature transports data via the MME (mobility management entity) by encapsulating them in NAS (non-access stratum) signalling. DoNAS can be used to transport both IP and non-IP traffic. The customer/user data is encrypted and integrity protected using the same mechanism reserved for network signalling, thus ensuring similar levels of protection.
Non-IP Data Delivery