Cyber Security for IoT applications

IIoT security

The Industrial Internet of Things is the nervous system for future value creation and industrial applications. The security of these systems is therefore of particular importance.

Almost every area of daily life now requires modern communication systems. Reliable communication systems are essential for a functioning economy and our closely networked society. We deal with the holistic security of networked and distributed systems in IoT. To this end, we research and develop processes and concepts for machine-based communication (M2M) in resource-limited systems, especially for industrial processes.

The solution: Building security awareness for protective countermeasures

Our research topics in Cyber Security

Device Identity Management

Device identity management is necessary to ensure the identity and authenticity of an IoT device. Especially in the area of machine based communication in resource limited systems special procedures, e.g. Context-Aware Authentication, are necessary.

Life-Cycle Management of Devices

Life-Cycle Management in the context of IoT security is the continuous guarantee of the security of an IoT device through updateability and the regular renewal of certification and key material through key management.

Why Cyber Security in the Internet of Things?

Cybercrime is booming! 500 billion € is the estimated annual damage caused by cybercrime worldwide.

The importance of IT and Cyber Security is constantly increasing due to the digitalisation of all areas of life, work and business. Due to the use of the Internet in more and more processes and tasks in administration and companies, but also in the private sector, we are highly dependent on functioning information technology and secure information infrastructures. Ensuring security in the World Wide Web and the protection of critical information infrastructures have become existential issues of the 21st century and require a high level of commitment from all those involved. Networks are converging worldwide, so that cyber attacks in other countries can also have an impact on IT security in Germany.

Security in the Internet of Things

The Internet of Things merges the real world with the digital world. As a result, the previous reliable protective wall between these worlds is disappearing more and more, so that cyber attacks can have real effects in everyday or professional life. Due to the limited resources available in cyberphysical systems on the Internet of Things or in sensor networks, conventional security mechanisms and techniques such as firewalls, intrusion detection systems or anti-virus software cannot be used.

Protective measures for wireless devices

Wireless devices are potentially exposed to cyber and hacker attacks due to their functions, especially their connection to computer networks or the Internet. The conditions imposed by the limited resources usually have a direct impact on the IT security of these systems. Tried and tested and partially standardized procedures and procedures often cannot be applied and the guarantee of the protection goals must be adapted to the special circumstances.

Networking challenges

The challenges of increasing networking are the drastic increase in possible points of attack. By 2020, an estimated 50 billion end devices will be integrated into our everyday lives on the Internet of Things. Security depends on the weakest system component, often the sensor node. Systems are becoming more complex and distributed. The sovereignty over a system is distributed among a large number of independent actors. This creates a major trust problem.

In contrast to consumer technologies, which have a lifetime of only 2 years (mobile phones), Industrial IoT uses systems that are often in use for several decades. In general, the challenge is to enable consistent data confidentiality, integrity and authenticity in data communication on the Internet of Things.

USPs

  • With us, the application is in the foreground
  • Security as added value
  • Security Usability – Security made to measure
  • We offer a wide range of technological know-how

Our service portfolio

  • Technology for secure identification and authentication in the Internet of Things
  • Feature-based identification
  • Methods and procedures for Life-Cycle Management: Keys, Updates
  • Technology consulting and development in the field of Cyber Security
  • Reliable security concepts along the information paths
  • Continuing education in the Lernlabor Cybersicherheit

Lernlabor Cybersicherheit of the Fraunhofer Academy

The Lernlabor Cybersicherheit (Learning Lab for Cyber Security) of the Fraunhofer Academy is a collaboration between Fraunhofer and selected universities of applied sciences. Specialists and managers from industry and public administration receive a compact qualification in high-quality laboratories with up-to-date IT infrastructure. There, they simulate real threat scenarios, learn to recognize their significance and consequences and study suitable solution concepts in practical use and efficiency. Users and decision-makers are addressed by setting up the Lernlabor Cybersicherheit and networking the continuing education offerings of various partner consortia.

Modules are offered in the following subject areas:

– »Industrial Production / Industry 4.0«

– »Critical Infrastructures / Application Case Energy and Water Infrastructures«

– »High Security and Emergency Response«

– »Internet security and IT forensics«

– »Software Quality / Product Certification«

– »Embedded Systems, Mobile Security and Internet of Things«

 

Embedded Systems, Mobile Security and Internet of Things

The subject area »Embedded Systems, Mobile Security and Internet of Things« therefore covers the entire development process from design to testing and certification of components. One focus is on security and privacy requirements in the design process, security techniques with specific hardware support, security measures for hardware and software implementation of security functions of embedded systems and the secure interaction of components in complex scenarios.

The topic "embedded systems, mobile security and Internet of Things" therefore covers the entire development process from design through to testing and certification of components.
The subject area »Embedded Systems, Mobile Security and Internet of Things« therefore covers the entire development process from design to testing and certification of components.

Fraunhofer Academy

The Fraunhofer Academy is the continuing education institution of the Fraunhofer-Gesellschaft and is aimed at specialists and managers of technology-driven companies who are interested in continuing education.

Lernlabor Cybersicherheit

The Lernlabor Cybersicherheit is a collaboration between Fraunhofer and selected universities of applied sciences. Specialists and managers receive a compact qualification in high-quality laboratories with up-to-date IT infrastructure.

Press release

However, the necessary protective measures for the IoT cannot be simply adopted from classic IT security, but must be adapted to wireless communication.