IoT SAFE: Robust IoT Security at Scale

Person looking at mobile phone smiling, light is reflecting on face in dark room

In this whitepaper, we review how a SIM, or any other Secure Element, can be leveraged as a root-of-trust to secure IoT device-to-cloud communications by implementing the world’s most popular application layer security protocol. The approach avoids duplication of secure hardware functions, by loading an additional security service for storing and processing the sensitive credentials used to establish the TLS handshake on the worlds most deployed secure processor, the SIM or eSIM. It is vital for the trustworthiness of the Internet of Things (IoT) that we take a secure-by-design approach by properly protecting and processing the credentials used to secure data exchange between the IoT device and the cloud. Otherwise, enterprises will not be able to rely on the quality, accuracy or integrity of the data being collected, rendering it useless or even worse, dangerous.

Contact the GSMA

Please get in touch if you need more information or have any queries about anything you see on our website.

Contact us