Secure IoT with PKI-based identities

For any IoT application, it is crucial to protect data, user privacy, and safety. Breaches can harm production continuity and business processes, customers’ trust, and – worst of all – human health and life.

To enable true end-to-end security and prevent cyber attacks against IoT applications, a public-key infrastructure (PKI) can be used to issue certificate-based identities. These trusted identities secure the IoT applications with strong authentication of devices, people and servers, encrypted communication and proven data integrity.

GET IN TOUCH

Nexus Identities for IoT

Protect communication between things

Nexus helps you to protect all types of smart devices, so that you can secure their communication and avoid hijacking.

 

 

 

 

 

How does it work?

The Smart ID PKI platform issues certificate-based, cryptographically secure and unforgeable identities that enable end-to-end security for the following sectors:

 

 

See the full Smart ID IoT platform here.

The Smart ID IoT platform ensures:

Strong authentication

Certificate-based authentication ensures that only authorized users, devices or servers can connect to a network or application. Revocation of certificates instantly blocks access in case of compromise or emergency.

Encryption and privacy

Certificates enable encrypted communication between devices and services for secure transmission of data over TLS.

Integrity

Digitally signed messages based on certificates can be used to prove the origin of data, and to detect manipulation of data. Signed firmware enables secure software updates.

Why Nexus

Nexus’ platform for IoT PKI has the following key benefits: 

High performance

Guaranteed high performance with a proven capacity to issue 10,000 certificates per second. Offered as a service, guaranteed SLA and capacity as you grow. 

Compliance

Fulfills automotive requirements by supporting standards, such as the IEEE 1609-2 and ETSI TS 103 097 (V2X) for digital certificate formats and interfaces, C-ITS for vehicle-to-grid (V2G), and ISO 15118 for plug & charge. 

High security

Proven security as Nexus’ quality-assured PKI platform is being certified according to Common Criteria EAL4+, and Nexus’ organization complies with ISO 27001 and TISAX. 

Want to know more about how we can help you?

Book a free demo

Examples of research projects

Research

New IoT research project aims to provide trusted high-quality elderly care

28 March, 2019
“We have initiated a new research project that we hope will result in a truly secure smart-healthcare system for elderly as well as younger and healthier people,” says Helen Holst, CIO at the Swedish municipality City of Solna.
Research

New research project aims to “shrink” public key infrastructure (PKI) technology to secure the IoT

9 March, 2017
The internet of things (IoT) applications have started to hit the market in big numbers – but security is lagging behind.
Research

Swedish research project CEBOT has solved one of the toughest IoT security problems

16 January, 2017
It has been hard to give resource-constrained things trusted identities, and as the internet of things (IoT) grows this has become one of the biggest security problems.

News and Resources

Blog IoT security PKI

Digital transformation: ensuring security and strengthening trust

24 September, 2020
Digital transformation: ensuring security and strengthening trust Digital transformation is on the radar of every organization as the urgency to move to an even more digital environment grows. Ensuring security and strengthening trust within an organizati...
Customer Cases IoT security

Nexus Go enables Danfoss to strengthen security for IoT devices

13 August, 2020
Nexus Go enables Danfoss to strengthen security for IoT devices We are pleased to announce that Danfoss, a leading Danish technology company focusing on infrastructure, energy efficiency and climate-friendly-solutions, has selected the Nexus Go IoT PKI to...
Blog IoT security

V2X Development and Use Cases

26 June, 2020
Vehicle-to-everything (V2X) Development and Use Cases The evolution of connected cars continues. Vehicle-to-everything (V2X) communication means that vehicles are able to transmit to and receive data from other vehicles, road infrastructure and also pedes...