Advanced IoT Security Use Case

February 2, 2022

With NFC, products are smarter, more interactive, and more traceable — they can talk to each other and to smart devices — making the IoT more trustworthy.

The growing constellation of connected Internet of Things (IoT) devices is transforming how we collect, exchange, analyze, and extrapolate huge amounts of data. Companies gather insights into everything, from understanding user behavior to increasing business efficiencies. As connected IoT devices continue to increase in number, it is more challenging for businesses to secure them and keep threats at bay. In the consumer product space, brands need to ensure their digitized products are connected and their identities are verified.

Based on the Advanced Encryption Standard (AES), Identiv’s NFC Tags with the NXP NTAG 22x chip series use symmetric key encryption, meaning there is only one secret key and the same key is used for encryption  and decryption. The tags provide capabilities for advanced anti-counterfeiting, innovative tamper detection, or batteryless condition sensing.

“IoT devices are attractive targets for cybercriminals because they offer an attack surface ripe for security breaches. Whether companies are beginning to adopt IoT or looking to expand their established IoT networks, all experience similar challenges when it comes to managing, monitoring, and securing their connected IoT environments.”
- Vera Mauerberger, Identiv PM Transponders

Ready to Read More?

Fill out the quick form below and click download.