Physical Layer Security for IoT Devices

Secure your devices from hackers and data breaches

What is PLS-IIoT?

Encryption is the gold standard to protect confidential and sensitive information over the internet. The robustness of the encryption schemes boils down to the security of the keys. So, the best practice is to update the keys as frequently as possible. It becomes a big challenge for IoT and sensor devices because:

  • resource constraints – limited compute, memory and storage capabilities and battery powered
  • deployment in open and hostile environments – making them easy to hack
  • Security is a after thought!! – Performance v/s Security trade-off
  • No encryption is in place
  • Secret keys are updated after ages

Our product complies with Product Security and Telecommunications Infrastructure Bill which prohibits using default passwords.​

Solution – Get PLS-IIoT key generation on board to secure your devices

Features

PLS-IIoT offers a lightweight encryption method that combines key generation and anomaly detection to protect internet-connected devices (e.g. sensors, PLCs, GPS trackers) from hackers and data breaches. ​

  • Lightweight Key Generation
  • Anomaly Detection Enabled
    • Node Removal
    • Node Compromise
  • Node driven randomness
  • Network Architecture Aware
    • Device to device
    • Pairwise communication
    • Broadcast Communication
  • Technology Agnostic
    • LoRaWAN
    • Wi-Fi
    • BLE
  • Scalable and Robust

Solutions

Verticals and Horizontals that we cover

PLS-IIoT is suitable for several types of monitoring and tracking use case scenarios where sensors and actuators are deployed for condition monitoring. Some of these are:

  • Smart Cities
  • Smart Transportation
  • Autonomous Vehicles
  • Critical National Infrastructures
  • Utilities
  • Smart Homes
  • Healthcare
  • Smart Manufacturing

Case Studies

PLS-IIoT has successfully been tested in the following case studies.

Infrastructure Management System

Our designed infrastructure monitoring system comprised of a series of raspberry pie devices acting as end nodes in a LoRaWAN network that fed data back to the gateway. The devices provide data relating to continuous monitoring of aseptic and other controlled environments.

Asset Tracking System

Asset tracking, in its simplest definition, is the method used to track a company’s physical assets either by scanning barcode labels attached to the assets or by using tags using GPS or RFID, which broadcast their location.

How the PLS-IIoT work?

How the PLS-IIoT work?

Passionate And Experienced

Meet our Talented Team

Get to know the talented individuals behind our agency

Aisha Junejo

Co-Founder

With over 10 years experience in the cyber security, Aisha leads our team
with passion and expertise.

Fatma Benkhelifa

Co-Founder

Fatma’s telecommunication research and experience ensure our customers receives top notch service and advice.

Please enable JavaScript in your browser to complete this form.
Name

Start Your Journey

Secure Your Internet Connected Devices

Deploy PLS-IIoT to protect your critical assets.