Select Page

Security

Security attempts to address the protection and threat from a growing number of IoT devices and systems in industrial, commercial and consumer environments.

The Challenge

As the Internet of Things deployments increase, common and scenario- or vertical-specific security and risk management requirements to protect personal, private, business and IP-related information are growing.

New methods are developed for matching security scenarios and specific verticals requirements, including embedded security functions within each device (e.g. advanced encryption), as well as security implications of expanded wireless networks handling increasing data volumes and device counts, while regulatory pressures to address security needs, are growing.

What We Do

We develop wireless embedded modules and adopt all security testing and certification services for required and recommended certifications. Our products are robust and resilient to malicious attacks and latent vulnerabilities.

Through our certifications and full leverage on Qualcomm’s worldwide product security programwe are able to help customers to develop secure devices and applications in any part of the world. Testing tools and regulatory services are tightly bound to our product portfolio to support end-to-end security and other compliance tests.

Why VoxMicro

We are an audited and certified North-American module maker and licensed Qualcomm partner with in-house RF engineering and deep expertise in secure Wi-Fi, Bluetooth and LoRa products.

We have provided highly reliable Wi-Fi and Bluetooth functionality to many customers. We support already plenty of customers to address successfully the protection and threat in industrial, commercial and consumer environments. We have experience in verticalization, where vertical specific security requirements apply, especially in aviation, automobile, defense, and many other industries.

How WPA3™ improves the Wi-Fi networks security essentially

Wi-Fi Protected Access new generation WPA3™ adds new features to simplify Wi-Fi security, enable robust authentication, deliver increased cryptographic strength for highly sensitive data markets, and maintain the resiliency of mission-critical networks. 

WPA3-Personal

WPA3-Personal brings better protections to individual users by providing more robust password-based authentication, even when users choose passwords that fall short of typical complexity recommendations. This capability is enabled through Simultaneous Authentication of Equals (SAE), which replaces Pre-shared Key (PSK) in WPA2-Personal. The technology is resistant to offline dictionary attacks where an adversary attempts to determine a network password by trying possible passwords without further network interaction:

  • Natural password selection: Allows users to choose passwords that are easier to remember
  • Ease of use: Delivers enhanced protections with no change to the way users connect to a network
  • Forward secrecy: Protects data traffic even if a password is compromised after the data was transmitted

Source and more information: Wi-Fi Alliance

WPA3-Enterprise

Enterprise, governments, and financial institutions have greater security with WPA3-Enterprise. WPA3-Enterprise builds upon WPA2 and ensures the consistent application of security protocols across the network. WPA3-Enterprise also offers an optional mode using 192-bit minimum-strength security protocols and cryptographic tools to better protect sensitive data:

  • Authenticated encryption: 256-bit Galois/Counter Mode Protocol (GCMP-256)
  • Key derivation and confirmation: 384-bit Hashed Message Authentication Mode (HMAC) with Secure Hash Algorithm (HMAC-SHA384)
  • Key establishment and authentication: Elliptic Curve Diffie-Hellman (ECDH) exchange and Elliptic Curve Digital Signature Algorithm (ECDSA) using a 384-bit elliptic curve
  • Robust management frame protection: 256-bit Broadcast/Multicast Integrity Protocol Galois Message Authentication Code (BIP-GMAC-256)

The 192-bit security mode offered by WPA3-Enterprise ensures the right combination of cryptographic tools are used and sets a consistent baseline of security within a WPA3 network.

Source and more information: Wi-Fi Alliance

© 2006-2019 VOXMICRO


All rights reserved.

About Us

Products

AIRETOS

OXFORDTEC

Technical Services

Capabilities

Markets

Case Studies

Press

Documentation