OTAC Solutions
IoT Auth Platform OTAC
Enforce and maintain a more secure and accurate authentication process with all IoT devices for businesses and homes.
Pain points
According to Statistica, the number of Internet of Things (IoT) devices worldwide is forecast to almost triple from 9.7 billion in 2020 to more than 29 billion IoT devices in 2030. This proliferation of IoT devices makes them easy targets for hacking and malware. In fact, 32% of the enterprises that have already adopted IoT consider data security issues related to the lack of skilled personnel to be the most critical concern for their IoT ecosystem.. Of course, various defense measures have emerged to prepare for these security threats, but there is a limit to encompassing low-cost, low-spec IoT devices.
-IoT hacking problems exploding worldwide
In 2021, a hacker group hacked a large amount of security camera footage collected by a Silicon Valley startup, accessed live feeds of 150,000 surveillance cameras installed in corporations, hospitals, schools, police departments, and even prisons, and released some videos as they were. This is a clear example of how easily an IoT hack can peek inside a sensitive organization. If you use an IoT password that is weak in terms of security, and do not upgrade the firmware of communication equipment such as a router that transmits command to IoT devices, or use unprotected network services, IoT devices will be easy prey for hackers.
-Life-threatening exploitation beyond asset theft
Numerous cyber threats such as deep fakes, phishing attacks, malware, and ransomware are now not only hacking home network security cameras. Unauthorized access and intrusion are also potential risk factors, and as a result new laws are emerging. In Europe, the focus is mainly on the imposition of manufacturers' security obligations such as the ban on basic encryption on smart devices and equipment, while in Asian countries including Korea, structural solutions such as the application of encryption technology are being actively discussed.
-Low-spec, low-power IoT device security needs
Unlike mobile devices that evolve into a single computer on their own, IoT devices range from high-performance devices such connected car to low-spec devices like a smart lamp that simply turn its power off and on. Therefore, there is a limit to applying a high-spec security solution that guarantees strong security to all low-spec, low-power IoT devices currently sold the most in the market. Accordingly, the demand for an IoT security solution that can cover even low-spec IoT devices is steadily increasing.
Solutions
SSenStone’s IoT Auth Platform OTAC provides a secure IoT communication environment by blocking the possibility of device hacking and control through dynamic codes that change each time they connect and command. Based on OTAC, a lightweight technology of less than 4KB, the OTAC Applet is embedded in the SIM card to implement strong end-to-end IoT authentication and control command protection that covers even low-spec IoT devices. In addition, it safely transports the control server command to the device to block the execution of various control commands that are not valid.
Device authentication and data integrity verification through OTAC capable of embedding to SIM card
SSenStone verifies the OTAC generated by the device during encrypted communication connection between the device and the server, and forms an encrypted communication channel if it is determined to be a device within a normal home network. OTAC is transmitted periodically even during the encrypted communication channel connection to determine whether to maintain the encrypted communication channel. In particular, both wired and wireless access ensure secure connection without compromising user convenience by verifying whether the registered user is a normal device through OTAC.
[AS-IS] IoT device control problem by unauthorised system
[To-be] IoT security system using SIM card with OTAC Applet embedded
Implement a secure IoT device firmware upgrade
Recently, hackers who attack IoT devices often manipulate the device firmware to download illegal firmware or plant malware on the device. SSenStone uses hashes of firmware files as a seed when generating OTAC to verify and execute only OTA commands sent from valid IoT servers. Therefore, since the download command from the unauthorized system itself is not approved by the device, it can naturally block the occurrence of illegal software downloads.
Improved security by linking with VPN, PSK-TLS, etc.
SSenStone’s IoT Auth Platform OTAC is not only used for IoT device authentication and data integrity but also can be used together for device authentication for new VPN connections and connection maintenance. Also, by using the OTAC generated for authentication and integrity assurance as a dynamic key that reinforces the fixed pre-shared key (PSK) of PISK-TLS, you can secure a lighter and higher level of confidentiality than current high-spec security layered system.
Supports both on-premise and cloud services
SSenStone provides an on-premise service that provides the OTAC system to telecommunication operators and installs it on-premise, and a cloud service that raises the OTAC server and API gateway to the cloud.
-On-premise service
The OTAC system built on-premise allows telecom operators to provide additional security products other than virtual private networks (VPNs) as additional services. It can be used as a service to secure new subscribers and create revenue sources by adding it as an option to the current IoT line plan itself.
-Cloud service
Telecom operators can use the IoT auth platform OTAC through the cloud service provided by SSenStone without building their own OTAC system. SSenStone provides OTAC APIs to IoT device companies that provide IoT services of the telecommunication service providers.
Benefits
Sustainability and high availability (HA) are critical keywords that underpin the products, services, and consumption of this era. SSenStone contributes to reduction in system construction and maintenance costs by reducing resource usage such as CPU and power through OTAC, a lightweight technology of less than 4KB, while shortening the time-to-market based on seamless integration, enabling telecom operators to provide new services quickly without failure or new infrastructure.
IoT authentication security system construction and maintenance cost reduction
OTAC is a lightweight technology of only 4KB, so it consumes very little CPU load or power. OTAC Applet embedded in a SIM card is an eco-friendly technology that uses only 20KB of memory. However, since it performs a security role similar to TLS required by IoT SAFE, it is possible to build a strong IoT authentication security system with fewer resources. In addition, it can be used as a cloud service without the need to build the system, which result in reduction of the initial deployment cost.
Expectation of new revenue as a complementary device to PN and VPN
As SSenStone’s IoT Auth Platform OTAC provides a new solution to the security, computing resource, and cost problems of private networks and virtual private networks (VPNs), it is particularly suitable for the IoT industry that uses low power. Since it can be applied as an inexpensive and lightweight security solution comparable to PN and VPN telecommunication operators can create new revenue models for IoT service providers who don’t require much video and data transmission or have cost-conscious clients.
Accelerate time-to-market through easy integration
SSenStone supports embedding the OTAC Applet in the SIM card from the start, but it also supports downloading or updating to SIM cards already in service. It accommodates not only regular SIM cards, but also eSIM (embedded SIM) and iSIM (integrated SIM), allowing multiple options for telcos and businesses alike. A SIM card embedded with the OTAC Applet is applied to communication equipment such as IoT gateways and routers or IoT devices that can be equipped with a SIM card, and is connected to the backend of the carrier through the LTE network, so the integration work is very simple. Also, the time to deployment and service launch can be shortened as it can be installed in the firmware of IoT devices or various mobile devices rather than the SIM card.
Why OTAC
OTAC, developed by SSenStone, is the original technology that provides all of the following features at the same time.
-
OTAC is a dynamic code, which means the code keeps changing. As a result, you don’t need to worry about any leak of your personal information, such as your card details, because the codes must have already been changed when others try to use them.
-
The network connection is NOT necessary at all for generating OTAC.
Reducing an authentication stage that requires the network connection directly means there are fewer gateways for the hackers to access our personal information.
Moreover, this feature enables users to authenticate even when they are in networkless environments, such as on the plane, underground, rural or foreign areas. -
swIDch can guarantee that the code never duplicates with anyone at any given moment.
There is NO chance of someone else having the same code. -
The users or their devices can be identified with the code alone.
Once OTAC has been generated, providing OTAC alone is already fully sufficient to identify the user as the code is unique.
It means, you can forget about the bundles of static information including IDs and passwords.
Insights
Contact Us
make your service reliable with SSenStone!
Inquire now.
5F, 329, Cheonho-daero Dongdaemun-gu, Seoul, Republic of Korea
Contact below if you have an urgent inquiry.
Korea Office (SSenStone)
5F, 329, Cheonho-daero Dongdaemun-gu, Seoul, Republic of Korea (02622)
Tel : 02-569-9668 | Fax : 02-6455-9668
im@ssenstone.com
UK Office (swIDch)
Office 158, 1st Floor, 3 More London Riverside, London, England, SE1 2RE
Tel : 020-3283-4081
info@swidch.com