Secure IoT with PKI-based identities

For any IoT application, it is crucial to protect data, user privacy, and safety. Breaches can harm production continuity and business processes, customers’ trust, and – worst of all – human health and life.

To enable true end-to-end security and prevent cyber attacks against IoT applications, a public-key infrastructure (PKI) can be used to issue certificate-based identities. These trusted identities secure the IoT applications with strong authentication of devices, people and servers, encrypted communication and proven data integrity.

GET IN TOUCH

Nexus Identities for IoT

Protect communication between things

Nexus helps you to protect all types of smart devices, so that you can secure their communication and avoid hijacking.

 

How does it work?

The Smart ID PKI platform issues certificate-based, cryptographically secure and unforgeable identities that enable:

Strong authentication: Certificate-based authentication ensures that only authorized users, devices or servers can connect to a network or application. Revocation of certificates instantly blocks access in case of compromise or emergency.

Encryption and privacy: Certificates enable encrypted communication between devices and services for secure transmission of data over TLS.

Integrity: Digitally signed messages based on certificates can be used to prove the origin of data, and to detect manipulation of data. Signed firmware enables secure software updates.

Smart ID platform      HOW TO BUY AND DEPLOY                                   

Why Nexus

Nexus’ platform for IoT PKI has the following key benefits: 

High performance

Guaranteed high performance with a proven capacity to issue 10,000 certificates per second. Offered as a service, guaranteed SLA and capacity as you grow. 

Compliance

Fulfills automotive requirements by supporting standards, such as the IEEE 1609-2 and ETSI TS 103 097 (V2X) for digital certificate formats and interfaces, C-ITS for vehicle-to-grid (V2G), and ISO 15118 for plug & charge. 

High security

Proven security as Nexus’ quality-assured PKI platform is being certified according to Common Criteria EAL4+, and Nexus’ organization complies with ISO 27001 and TISAX. 

Want to know more about how we can help you?

Book a free demo

Examples of research projects

Research

New IoT research project aims to provide trusted high-quality elderly care

28 March, 2019
“We have initiated a new research project that we hope will result in a truly secure smart-healthcare system for elderly as well as younger and healthier people,” says Helen Holst, CIO at the Swedish municipality City of Solna.
Research

New research project aims to “shrink” public key infrastructure (PKI) technology to secure the IoT

9 March, 2017
The internet of things (IoT) applications have started to hit the market in big numbers – but security is lagging behind.
Research

Swedish research project CEBOT has solved one of the toughest IoT security problems

16 January, 2017
It has been hard to give resource-constrained things trusted identities, and as the internet of things (IoT) grows this has become one of the biggest security problems.

News and Resources

Blog IoT security

V2X Development and Use Cases

26 June, 2020
Vehicle-to-everything (V2X) Development and Use Cases The evolution of connected cars continues. Vehicle-to-everything (V2X) communication means that vehicles are able to transmit to and receive data from other vehicles, road infrastructure and also pedes...
Customer Cases Lifecycle management LTE

Mobily selects Nexus Smart ID to enable trust in future identities

4 May, 2020
Mobily selects Nexus Smart ID to enable trust in future identities We are pleased to announce that Mobily, the second-largest telecommunications operator in Saudi Arabia, and part of the Etisalat Group, the largest telecom in Middle-east, has selected Nex...
IoT security PKI

New lightweight PKI technologies help secure constrained IoT devices

9 December, 2019
New lightweight PKI technologies help secure constrained IoT devices As billions of devices are being connected to the internet of things, security is lagging behind. Especially for small and battery-powered devices with constrained computing resources. B...