UNICUS™ and IOT

An effective IoT security architecture must provide security for a wide range of device types. Devices differ in both their data transmission requirements and in their processing and connectivity requirements.

In terms of their processing and connectivity capabilities, devices can be classified as basic or advanced. Basic devices typically have a low powered processor, run a specialist embedded operating system, and can communicate over relatively short distances using technologies such as Bluetooth or 802.15.4 (low-rate wireless personal area networks, LoRa). Basic devices are not capable of establishing direct Internet connections. Advanced devices have more powerful processors; run a UNIX based operating system and support Wi-Fi 6, 5G connections or a direct wired SD-WAN connection enabling a direct Internet connection.

To secure both basic and advanced devices, the UM Labs R&D have designed a distributed IoT encrypted end to end edge security architecture from UNICUStm.  All components of this architecture are implemented in a blade design software module. This approach means that the components run on a wide range of both low-level firmware and processors such as Raspberry-Pi hardware and cloud platforms.

At the core, a central security system handles connections from a large number of IoT connected devices. This central security system provides both security and management functions for those devices. Advanced devices capable of making direct connections are secured and managed by the IoT security core. Basic devices are handled by a Local Concentrator which provides a number of methods of connecting to those basic devices. 

Let's talk

We are are pioneers & leaders of security software services for real-time communications using any cloud computing. If you need robust security protection, let’s start a conversation.

 
SNITCH Attack Intelligence   +++  354,539 attacks from 141.98.10.47, location Lithuania    +++  218,308 attacks from 192.3.222.141, location United States    +++  28,783 attacks from 47.115.115.60, location China    +++  16,303 attacks from 142.44.178.223, location India    +++  11,025 attacks from 45.95.147.24, location Netherlands    +++  5,382 attacks from 144.48.39.110, location Australia    +++  3,291 attacks from 193.46.255.229, location Netherlands    +++  1,805 attacks from 193.46.255.214, location Netherlands  
2-6 Boundary Row,
South Bank,
London
SE1 8HP

© UM Labs 2021. All Rights Reserved.  Privacy Policy | Cookie Policy

Designed and developed by mtc