Connectivity and security protocols

Connectivity and security are key requirements for IoT applications.
Trusted Objects has developed a set of secure connectivity stacks that facilitate the integration of the security in the IoT chain.
Covering several protocols, including LoRaWAN, SigFox, TLS, and DTLS, the connectivity stacks developed by Trusted Objects are either embedded into a secure hardware, or available as a separate IP. This architecture brings developers ease of integration and enhanced security.
 
  • LoRaWAN: Trusted Objects connectivity stacks is compliant with LoRa alliance specification 1.0.2 and 1.1,
  • Sigfox recognizes Trusted Objects as a security partner, 
  • NB-IoT: Trusted Objects proposes a DTLS stack compatible with CoAP (Constraint Application Protocol),
  • TLS stack can be used for both IP and non IP-devices.