You’re probably tired of hearing me say it, but it can’t be stressed enough—security must be paramount in your design, whether it’s a financial system, a medical device, or a home-automation product. Don’t get caught closing the barn door after the cows have left, or whatever that saying is.
In attempt to shut that barn door, so to speak, the Z-Wave Alliance has announced some new security requirements for any IoT devices that comply with its standard. Z-Wave is a communications protocol that allows all types of home-automation products to interact seamlessly. This could include anything from thermostats and garage door openers to lights, locks, and alarm systems.
The Alliance’s Board of Directors recently mandated that all devices receiving Z-Wave Certification after April of next year must include the latest Security 2 (S2) framework, what it deems as the industry’s strongest levels of IoT security. This affects mostly smart-home devices and controllers, gateways, and hubs.
The S2 framework was developed by the Alliance, but with the help of leading cybersecurity hacking experts. If followed correctly, S2 removes the risk of networked devices being hacked, in theory at least, in their communications between the devices and the cloud.
By using a QR or pin-code on the device itself, the devices are uniquely authenticated to the network as well. This should thwart common hacks. In addition, for further protection, Z-Wave strengthened its cloud communication protocol, enabling the tunnelling of all Z-Wave over IP (Z/IP) traffic through a secure TLS 1.1 tunnel.
- Dev Tools & OS
- Machine Learning
- Reference Designs
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Embedded World
Bluetooth and market trends in mesh networking
Of all the design decisions associated with an Internet of Things (IoT) deployment, the most fundamental is...
How to Develop Cross-Industry IoT InteroperabilityMulti-Part Series
We also recommend:
Embedded Insiders: Who are the real innovators in the embedded space?
Apple took center stage this week as it announced a series of new iPhones and a new Apple Watch. Is that exciting technology? It probably is to some, but not to the Embedded Insiders. So that begs...
Taoglas Boost Technology Improves Antenna Performance
Patent-pending Taoglas Boost technology provides up to 2 dB performance increase for onboard antennas.
Eliminating buffer overflow vulnerabilities on the IoT
Buffer overflows have been the most commonly exploited vulnerability in network-borne attacks over the last 30 years. This isn’t surprising given how buffers are created.
Designing Smart Home and Wearables IoT Applications – Part III
To be able to implement capabilities where a smart home and wearable device can interact, wearable devices need an embedded MCU with a flexible and integrated architecture.
Designing Smart Home and Wearables IoT Applications – Part II
Watches are no longer just for telling time. Smart watches have turned our wrists into smart phone holsters by enabling text messaging, phone calls, and health monitoring.
Decawave and Runtime Improve Real-Time Location Services
Decawave and Runtime’s support for Apache Mynewt underpins large-scale device management for UWB-based location applications.
PsiKick’s Steam Traps Provide Patented Batteryless IoT Sensor Technology
PsiKick's Steam Trap Monitor (STM) is designed to continuously analyze steam traps to deliver cost-saving insights across a range of industrial environments and sends alerts in real time.
SiFive Welcomes Hex Five Security’s MultiZone to its Software Ecosystem
SiFive will incorporate MultiZone Security into its Freedom SDK through the partnership for easy implementation by SiFive customers seeking a Trusted Execution Environment.
Rohde & Schwarz launch 5G NR network measurement solution
Rohde & Schwarz is initiating 5G New Radio (5G NR) network measurements with the first commercially available 5G NR network measurement solution.
Low-latency, distributed database architectures are critical for emerging fog applications
There’s increasingly large and fast data coming from a very broad spectrum of IoT devices, coupled with critical latency requirements.
Qt World Summit 2018 Events to Showcase the Latest Innovations in Software Development & User Experience
Learn and share best practices for embedded, mobile and desktop development at Qt's flagship conference in Boston and Berlin
8 sensor protocols for your next IoT project
This blog illustrates 8 IoT communication protocols that have been widely deployed in numerous existing and emerging IoT applications.
Real-Time Location Systems Enhances Internet of Things for Better Location Services
The RTLS market for health care analysis is segmented by product type, technology, facility type, application and geography.
Five Minutes with…Peter Thorne, Director, Cambashi
Are you up to speed on digital twins? If you’re not, you probably should be, especially if you plan to play in the IoT space. I have to admit that I needed to be educated on this topic. I received...
IoT Connectivity: Choosing a Black-Box, White-Box, or Gray-Box Approach
Internet of Things (IoT) developers have a choice of approaches for creating connectivity to IoT clouds, each with different advantages and trade-offs. How can you tell which option is the best one?
Microsoft Azure IoT SDK Support Added to Express Logic X-Ware Platform
Antenova ultra-small GNSS antenna modules integrate active LNA, SAW filter
On-board LNA and SAW filters serve to boost signal to the GNSS processor when line-of-sight to the horizon or sky is restricted.
SiTime and Bosch to Collaborate on MEMS Timing for 5G and IoT
Integration of SiTime’s Innovative MEMS Timing Solutions to deliver the best consumer experience.
Securing Industrial IoT Sensors, part 3: Foundational Trust for IoT
The Internet of Things (IoT) and other market segments are driving architectures and connectivity solutions with challenging power, security, resource and other constraints.
Uncovering the Fog Around IoT Edge Computing