You’re probably tired of hearing me say it, but it can’t be stressed enough—security must be paramount in your design, whether it’s a financial system, a medical device, or a home-automation product. Don’t get caught closing the barn door after the cows have left, or whatever that saying is.
In attempt to shut that barn door, so to speak, the Z-Wave Alliance has announced some new security requirements for any IoT devices that comply with its standard. Z-Wave is a communications protocol that allows all types of home-automation products to interact seamlessly. This could include anything from thermostats and garage door openers to lights, locks, and alarm systems.
The Alliance’s Board of Directors recently mandated that all devices receiving Z-Wave Certification after April of next year must include the latest Security 2 (S2) framework, what it deems as the industry’s strongest levels of IoT security. This affects mostly smart-home devices and controllers, gateways, and hubs.
The S2 framework was developed by the Alliance, but with the help of leading cybersecurity hacking experts. If followed correctly, S2 removes the risk of networked devices being hacked, in theory at least, in their communications between the devices and the cloud.
By using a QR or pin-code on the device itself, the devices are uniquely authenticated to the network as well. This should thwart common hacks. In addition, for further protection, Z-Wave strengthened its cloud communication protocol, enabling the tunnelling of all Z-Wave over IP (Z/IP) traffic through a secure TLS 1.1 tunnel.
- Dev Tools & OS
- Machine Learning
- Reference Designs
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Embedded World 2018
Bluetooth and market trends in mesh networking
Of all the design decisions associated with an Internet of Things (IoT) deployment, the most fundamental is...
How to Develop Cross-Industry IoT InteroperabilityMulti-Part Series
We also recommend:
Five Minutes with…Todd Edmunds, IIC
The Industrial Internet Consortium, aka the IIC, recently released a whitepaper titled Introduction to Edge Computing in IIoT.
Bandwidth, performance, and security: What we expect of the cloud
The cloud seems to provide us with infinite communications bandwidth, infinite performance, and total security. All these assumptions are lies.
Edge processing points to custom SoC
A major, often hidden cost in an IoT application can be that of installation, particularly for sensor nodes that need to be placed in locations that are difficult to access.
FPGAs for embedded AI: Reducing power consumption, programming complexity for mass markets
Developers are investigating AI in embedded applications for automotive, industrial, and consumer markets. Many of these have strict thresholds in terms of the power consumption and complexity.
Visualizing Bluetooth and Wi-Fi coexistence issues on the IoT
To minimize the impact of RF interference in the 2.4 GHz spectrum, protocol and spectrum analyzers have become an increasingly important apparatus in the developer’s toolbox.
Five Minutes with…Ed Chao, CEO, PoLTE
Can you determine location by hearing an object or person’s position?
Security in medical devices, Part 2: The attack surface analysis
Today we’ll examine the attack surface analysis – what it is, why it’s used, and some best practices to use when developing secure applications.
Ellisys Introduces Groundbreaking Bluetooth(r) Analyzer Supporting Wi-Fi 11ac 3x3 and WPAN 15.4
Next-Generation Bluetooth Vanguard(tm) Addresses Evolving IoT and Wireless Connectivity Advancements
Pentek introduces 766-channel software radio receiver for surveillance and wireless applications
The Model 71865 is an economical and energy efficient, complete software radio receiver solution for commercial, military and government high-channel count applications.
Industry giants Dell, IBM, Intel and Microsoft join 300+ sensing technology providers at 2018 Sensors Expo & Conference
Thousands of sensor applications and industry leader partnerships to be featured at annual event highlighting innovation
Cloud-based simulation provider Metrics partners with T&VS to accelerate Verification's move into the cloud
T&VS will use Metrics platform to manage and leverage big simulation data to overcome barriers restricting simulation capacity.
Marvell’s 802.11ax Concurrent Dual Wi-Fi Targets Next-Generation Connected Cars
The 88Q9098 wireless SoC offers 802.11ax two-by-two plus two-by-two concurrent dual Wi-Fi operation.
This year, COMPUTEX gathered over 1,600 hardware and software suppliers from 30 countries to demonstrate their technology, solutions and products to global buyers.
ITTIA and QNX partner to store and analyze IoT data
ITTIA and BlackBerry QNX strengthen and simplify software development innovation for industrial IoT and Embedded Systems manufacturers.
E Ink displays offer new paradigm for badges
With their small size and low-power requirements, a host of information can be stored on a badge.
Marketer’s guide to Sensors Expo 2018
Your guide to increasing exposure, driving leads, booth traffic and outshining your competitors at Sensors Expo.
The “Aha!” moments of my cloud understanding
The term "cloud" seemed to trivialize all the technology I had spent my career working on and the sophistication of the system I had come to deeply appreciate.
WIN Semiconductors releases 0.45µm GaN power process for 5G applications
The NP45-11 technology provides 50-volt operation with superior power density and efficiency for demanding 5G infrastructure such as MIMO antenna systems...
Fog computing: Bringing SDN to IIoT
Fog Computing offers an innovative solution to address these challenges by providing secure access to Operational Technology infrastructure within the framework of Information Technology toolsets
MathWorks adds new predictive maintenance product for MATLAB