Representatives of the Cybersecure IoT research team from IK4-IKERLAN, together with Telefónica and Amazon Web Services (AWS), show these days an innovative solution to securely connect Internet of Things (IoT) devices to the cloud at Mobile World Congress, the flagship event of the telecommunication industry hosted in Barcelona. The demonstrator which will be unveiled in Barcelona introduces an innovative solution based on SIM cards to securely distribute certificates to connect devices to Amazon Web Services IoT (AWS IoT).
The proposed approach developed by IK4-IKERLAN, Telefónica and AWS securely connects IoT devices to AWS IoT. The solution simplifies the management of the secure connection of IoT devices to the cloud, and enables large-scale remote distribution of credentials, facilitating and protecting the connectivity of IoT devices to the cloud.
The prototype developed by Telefónica, Amazon and IK4-IKERLAN, can be visited until March 1st at the GSMA stand (organizer of the event, one of the major events of telecom industry), in Hall 4 at the Fira Barcelona.
The connectivity solution developed by IK4-IKERLAN for a Smart City use case makes it possible to monitor the energy consumption using a Smart Meter from ZIV, IK4-IKERLAN’s client, and a Smart Modem that provides cybersecure connectivity to the cloud.
IK4-IKERLAN, in collaboration with Telefónica and its cybersecurity unit (Eleven Paths), has developed the software embedded in the Smart Modem that manages the complete certificate provisioning cycle in the IoT node. This will allow to massively distribute security certificates used by IoT nodes to connect to Amazon Web Services, without having to enter any key or credential in the devices beforehand. The certificate delivery is based on the 3GPP SIM management standard technology, which allows the solution to be available on any Telefónica IoT SIM card.
“The technological breakthrough devised by IK4-IKERLAN together with Telefónica and Amazon Web Services, not only it does enable an agile connection to the cloud, but it also does so without compromising the security of the process, which, on the contrary, is reinforced by a second authentication factor, the management of out-of-band credentials," explains Josu Bilbao, head of the Cybersecure IoT research group at IK4-IKERLAN.