IQRF Alliance
  • Home
  • Alliance
  • Marketplace
  • Case Studies
  • Programs
    • IQRF Smart Schools
    • IQRF Start-up
  • Technology
  • Communication
    • News
    • Events
    • Press
    • Gallery
    • Newsletter
    • Downloads
    • IQRF Interoperability
    • Privacy Policy
    • Contacts
  • Join
  • Login


    Forgot password?

News

A lot of things goining on in the IQRF Alliance.
Browse through the news to learn more.

Ecryption in IQRF OS 4.0

17 March 2017

Security is the main feature in new IQRF OS 4.0 releasing March 23rd. To protect a network running on the IQRF wireless technology, there are various security features and improvements. One of those features is encryption.

IQRF OS 4.0 brings three different protection layers based on AES-128. It is – access encryption, networking encryption and user encryption. If you want to know more about those protection layers, read it here.

 

So, what other features in IQRF OS 4.0 are encrypted?

Network passwords are randomly generated with high entropy and delivered encrypted to devices during bonding process.

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding, CATS services and network backup and restore.

Networking encryption is the most important part of the whole process of network communication. Network communication is encrypted by OS itself and user don't have to care about it. Thus, every IQRF network is equally highly secured by default. Only systems with valid Network password are allowed to interact with network and individual devices. AES-128 encryption protocol with 16 B long keys is used together with proprietary Cipher Data Chaining algorithm.

User encryption is another option how to improve security of data transmission. This option is fully under user's control. The key, specified by user, is used. This key is unknown for OS to push security level even further. Data transferred inside of encrypted packets are furthermore encrypted by user's key. This makes readability of data impossible both for OS and anyone who doesn't know the user's key. User encryption/decryption can be performed outside TR e.g. in application itself, which ensures safety even beyond the network.

 

- - -

Back

Repository

Join The Alliance

Newsletter

IQRF Alliance

We are an open international IoT alliance (including design houses, manufacturers, cloud providers, telco operators, system integrators, research and innovation centers, technical high schools and universities) with the mission to deliver #1 wireless IoT devices and solutions based on the IQRF Technology.

Contact

Prumyslova 1275
506 01 Jicin
Czech Republic

E-mail:
info@iqrfalliance.org
www:
www.IQRFAlliance.org
 
www.iqrf.org
Facebook Twitter LinkedIn iqrf.shop Repository www.iqrf.org Cookies setting
Close