UNICUS™ and IOT

An effective IoT security architecture must provide security for a wide range of device types. Devices differ in both their data transmission requirements and in their processing and connectivity requirements.

In terms of their processing and connectivity capabilities, devices can be classified as basic or advanced. Basic devices typically have a low powered processor, run a specialist embedded operating system, and can communicate over relatively short distances using technologies such as Bluetooth or 802.15.4 (low-rate wireless personal area networks, LoRa). Basic devices are not capable of establishing direct Internet connections. Advanced devices have more powerful processors; run a UNIX based operating system and support Wi-Fi 6, 5G connections or a direct wired SD-WAN connection enabling a direct Internet connection.

To secure both basic and advanced devices, the UM Labs R&D have designed a distributed IoT encrypted end to end edge security architecture from UNICUStm.  All components of this architecture are implemented in a blade design software module. This approach means that the components run on a wide range of both low-level firmware and processors such as Raspberry-Pi hardware and cloud platforms.

At the core, a central security system handles connections from a large number of IoT connected devices. This central security system provides both security and management functions for those devices. Advanced devices capable of making direct connections are secured and managed by the IoT security core. Basic devices are handled by a Local Concentrator which provides a number of methods of connecting to those basic devices. 

Let's talk

We are are pioneers & leaders of security software services for real-time communications using any cloud computing. If you need robust security protection, let’s start a conversation.

 
SNITCH Attack Intelligence   +++  23,766,080 attacks from 13.68.240.69, location United States    +++  22,190,823 attacks from 20.80.3.104, location United States    +++  19,246,512 attacks from 157.55.182.80, location United States    +++  16,472,176 attacks from 20.119.227.121, location United States    +++  3,546,436 attacks from 45.95.147.16, location Netherlands    +++  1,091,064 attacks from 95.216.94.94, location Finland    +++  365,594 attacks from 165.22.244.142, location Singapore    +++  18,549 attacks from 20.219.9.99, location India  
2-6 Boundary Row,
South Bank,
London
SE1 8HP

© UM Labs 2021. All Rights Reserved.  Privacy Policy | Cookie Policy

Designed and developed by mtc