Your Security Partner

Secure Authentication

In the last few years Machine-to-Machine (M2M) has seen widespread use and can be found in a variety of applications within the Internet of Things (IoT). With this growing adoption, authentication and access control are becoming increasingly important and critical functionalities in the context of M2M to enable secure communication between devices.

Authentication is of particular importance as it is the process of determining whether something is, in fact, what it is declared to be, especially when it may be used to trigger subsequent actions. If the validity of the data cannot be verified, a number of attacks are possible such as malware, spoofing, phishing and denial of service.

It is not only imperative to make an authentication mechanism attack resistant but also make it lightweight within an M2M environment that is resource constrained and distributed.

TrustPoint Innovation's solution to address this need is to provide digital certificates, based on the Elliptic Curve Cryptography (ECC). These certificates ensure secure authenticity of the device that is being read or connected to. They are designed to do so by utilizing as little computing resources as possible, thus making them best suited for M2M authentication where memory and bandwidth is limited.

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

Recent Posts