Device identities and PKI
Most secure way to generate unique device identities and maintain device PKI hierarchies
Support for strong and unique
A strong and unique identity allows the IoT device to authenticate itself when it connects to the network. It also ensures secure and encrypted communication with other devices, services, and users.
Our Platform supports the issuance of initial device identities during manufacturing, utilizing, for example, X.509 certificates to provide the credentials necessary to protect the entire IoT ecosystem. Cryptographic key pairs can also be generated within the device for enhanced security.
Additionally, we support the issuance of short-lived identities to facilitate client-initiated bootstrapping mode for LwM2M protocol-based device management solutions.
PKI hierarchies for secure boot
Secure boot authentication is typically based on public key cryptography. In some cases, this requires creating and maintaining a PKI hierarchy specific to the microcontroller. An example of this is the High Assurance Boot (HAB) for NXP i.MX families. Our Platform supports the seamless creation of the microcontroller-specific PKI hierarchy in addition to all other keys required for secure boot.
Check out how — a global market leader in weather, environmental, and industrial measurement technologies — utilizes LAAVAT solution to provide secure and reliable edge gateways and sensors that customers can trust.