In the Internet of Things (IoT) era, machines are increasingly networked. A development that also contains inherent dangers. This is because such networks are an open invitation to cyber criminals if they are not sufficiently secured. The German federal government has already recognized these dangers and taken a crucial first step with its “Digital Agenda” and the IT Security Act to ensure that IT systems and digital infrastructures in Germany will be among the world`s most secure. This is because disruptions or outages of critical infrastructures in energy and water supply or the emergency and life saving service sectors can cause significant economic and personal damage that directly affects the general public. At the same time, such cyber attacks can have extensive and very expensive results to companies of other sectors as well.
Increased demand for IT security
Consequently, the issues of IT security, data protection, and mass communication are gaining in importance as the technical challenges become ever more demanding. And this is exactly the crux of the matter – high security requirements such as the implementation of cryptographic prerequisites require many years of practical expertise and specialized knowledge that is only shared by a limited number of experts. In contrast, the purely administrative processes on the application level that are based on these infrastructures are relatively easy to master.
Open Interface Coupled with Safety
MTG has taken advantage of this need and developed the MTG CryptoController (MCC), an innovative solution that separates the area of “cryptography and mass data communication” on the application level from machine-to-machine software. This allows software developers to securely communicate via an open interface with any number of intelligent devices and machines and safely control them without having to deal with highly complex cryptographic methods.
Secure Management of Cryptographic Keys
How is this applied in practice? MCC handles the secure administration of the kryptographic keys and certificates, the encryption of the communication, and the encryption and decoding of the content data. However, the solution is not limited to the server side (e.g. for M2M cloud services), but can also act as a “counterpart” on the hardware side. The client software can carry out the encrypted control commands, such as, for example, switching a PV system on and off. As there is no uniform protocol standard on the device side, the system works with a multi-protocol framework that can simultaneously comprehend and implement different control commands. The application opportunities of this M2M solution range from telemedicine, IoT, Car-to-X, up to smart homes and intelligent energy networks. For more information about the CryptoController, visit this site.