Secure IoT with PKI-based identities

For any IoT application, it is crucial to protect data, user privacy, and safety. Breaches can harm production continuity and business processes, customers’ trust, and – worst of all – human health and life.

To enable true end-to-end security and prevent cyber attacks against IoT applications, a public-key infrastructure (PKI) can be used to issue certificate-based identities. These trusted identities secure the IoT applications with strong authentication of devices, people and servers, encrypted communication and proven data integrity.

GET IN TOUCH

Nexus Identities for IoT

Protect communication between things

Nexus helps you to protect all types of smart devices, so that you can secure their communication and avoid hijacking.

 

How does it work?

The Smart ID PKI platform issues certificate-based, cryptographically secure and unforgeable identities that enable:

Strong authentication: Certificate-based authentication ensures that only authorized users, devices or servers can connect to a network or application. Revocation of certificates instantly blocks access in case of compromise or emergency.

Encryption and privacy: Certificates enable encrypted communication between devices and services for secure transmission of data over TLS.

Integrity: Digitally signed messages based on certificates can be used to prove the origin of data, and to detect manipulation of data. Signed firmware enables secure software updates.

Smart ID platform      HOW TO BUY AND DEPLOY                                   

Why Nexus

Nexus’ platform for IoT PKI has the following key benefits: 

High performance

Guaranteed high performance with a proven capacity to issue 10,000 certificates per second. Offered as a service, guaranteed SLA and capacity as you grow. 

Compliance

Fulfills automotive requirements by supporting standards, such as the IEEE 1609-2 and ETSI TS 103 097 (V2X) for digital certificate formats and interfaces, C-ITS for vehicle-to-grid (V2G), and ISO 15118 for plug & charge. 

High security

Proven security as Nexus’ quality-assured PKI platform is being certified according to Common Criteria EAL4+, and Nexus’ organization complies with ISO 27001 and TISAX. 

Want to know more about how we can help you?

Book a free demo

Examples of research projects

Research

New IoT research project aims to provide trusted high-quality elderly care

28 March, 2019
“We have initiated a new research project that we hope will result in a truly secure smart-healthcare system for elderly as well as younger and healthier people,” says Helen Holst, CIO at the Swedish municipality City of Solna.
Research

New research project aims to “shrink” public key infrastructure (PKI) techn...

9 March, 2017
The internet of things (IoT) applications have started to hit the market in big numbers – but security is lagging behind.
Research

Swedish research project CEBOT has solved one of the toughest IoT security ...

16 January, 2017
It has been hard to give resource-constrained things trusted identities, and as the internet of things (IoT) grows this has become one of the biggest security problems.

News and Resources

Customer Cases IoT security PKI

Nexus enables seamless vehicle charging through Hubject

12 November, 2019
Nexus enables seamless vehicle charging through Hubject Hubject selected Nexus' IoT PKI as a Service to enable a seamless and secure service for its partners and customers. The future digital economy will rely on transportation and enabling trusted ident...
Connected vehicles Customer Cases

Volkswagen premieres all-new Golf with V2X capabilities

29 October, 2019
Volkswagen is leading the way to a new phase of traffic safety and Nexus is extremely proud to be a part of the journey! Volkswagen is now focusing even more on digital, hybrid and safety functionality. The all-new Golf has been introduced as the first Vol...
Connected vehicles

Video: How a leading automaker uses the Nexus PKI platform to protect Car2X...

11 September, 2019
In this 9-minute video, public key infrastructure (PKI) expert Tamás Horváth explains how a leading automaker protects car-to-everything (Car2X, also known as vehicle-to-everything, V2X) communication with PKI certificates. You will get answers to question...