The necessity of IoT Security illustrated by a smart home control on a tablet

IoT Cybersecurity Testing

Security for all devices on the Internet of Things

The special feature of the Internet of Things (IoT) consists essentially of connected devices. These include sensors and actuators as well as backend connections and optionally communicate with gateways and smartphone apps.

We test all common radio technologies.

In devices used today, various radio technologies are used, which can be differentiated in their function:

To connect the networked device to smartphones or gateways:

  1. Bluetooth
  2. Zigbee
  3. WLAN/Wi-Fi
  4. Comparable technologies

To connect to the backend: a (mostly) cellular mobile phone connection.

Strengthening IoT Cybersecurity – in several ways

A selection of different icons, man in the background clicks on the cloud security symbol

Networking in particular makes applications and components of IoT devices vulnerable to attack. To access a networked device, three main targets are attacked: the device itself, the network and the infrastructure (app, cloud).

But the security of the networked environment can prevent such external access. Elements of a holistic IoT Cybersecurity are among others:

  • Secure application
  • Robust design
  • Trustworthy handling of private data
  • Update/upgrade behavior of firmware and software
  • Security against attacks on the data validity and authenticity of the communication partners

Our services

Our laboratory in Germany, has been recognized by CTIA – The Wireless Association – as a CTIA Authorized Test Laboratory (CATL) for the CTIA Cybersecurity Certification Test Plan for IoT Devices.

The test plan defines the cybersecurity tests that will be conducted in a CATL on devices submitted for CTIA Cybersecurity Certification. The Certification is defined in three levels. The first level identifies core IoT device security features and the second and third levels identify security elements of increasing device complexity, sophistication and manageability.

Testing assumes that the device provides an execution environment for IoT applications that makes use of the LTE or 5G communications module and/or the Wi-Fi communications module. If the IoT application is not associated with at least one of these communications modules, then the device architecture is out of scope of the test plan.

With our CETECOM IoT Cybersecurity services we verify the current state of IoT security of your networked devices – an important milestone in the market launch of your products. Benefit from our years of experience in the regulatory certification of products with wireless technologies.

Further Topics

Stay up to date.
The CETECOM™ newsletter is sent out about once a month. No constant follow-up mails. Only selected content from our experts.