Thales IoT SAFE

Thales IoT SAFE is an interoperable security service implemented as Software-as-a-Service (SaaS), designed to establish a secure communication and management framework for IoT devices. The service focuses on devices equipped with Subscriber Identity Modules (SIMs), leveraging their inherent secure element capabilities. Its design adheres to the GSMA IoT SAFE specifications, promoting a standardized approach to IoT security. This framework is deployed in collaboration with mobile network operators (MNOs) to integrate device-level security directly into cellular network infrastructure. 

The fundamental principle of Thales IoT SAFE involves establishing a hardware-based root of trust within the IoT device, utilizing the tamper-resistant properties of the SIM. This secure foundation supports robust device authentication, integrity protection for data transmission, and a structured approach to credential management throughout the device lifecycle. 

The operational architecture of Thales IoT SAFE is composed of three interconnected technical constituents: Secure SIM Technology, a Remote Management Feature, and an IoT Server Integration. 

Secure SIM Technology 

The Secure SIM Technology provides the cryptographic anchor for Thales IoT SAFE, forming a chip-to-cloud security chain. Modern SIMs (including traditional SIM, eSIM, and iSIM form factors) incorporate a secure element. This secure element is a dedicated, tamper-resistant microcontroller certified to securely store cryptographic keys, device identities, and execute cryptographic operations within a protected environment. 

Within the context of Thales IoT SAFE, these secure elements are provisioned with unique device identities and asymmetric cryptographic key pairs (e.g., RSA or ECC) during manufacturing or via secure remote provisioning protocols. This secure element acts as the primary hardware root of trust for the device, providing robust protection against software attacks or physical attempts to extract sensitive cryptographic material. Key functionalities provided by this secure SIM technology include: 

  • Secure Key Storage: Private keys, device certificates, and other sensitive cryptographic assets are maintained within the secure element, rendering them highly resistant to unauthorized access or exfiltration. The secure element prevents the private key material from being directly accessible to the device's main application processor. 

  • Cryptographic Primitives Execution: The secure element performs cryptographic operations, such as digital signature generation (e.g., ECDSA), key agreement protocols (e.g., ECDHE), and secure random number generation. These operations ensure that private keys remain within the secure boundary of the SIM during their use. 

  • Device Authentication: Devices utilize the cryptographic capabilities of the SIM to perform strong, mutual authentication with cloud platforms or application servers. This is typically achieved by participating in TLS (Transport Layer Security) or DTLS (Datagram TLS) handshakes, where the SIM-based credentials are used to establish a cryptographically verifiable and authenticated communication channel. This mechanism mitigates risks associated with spoofing and unauthorized device access. 

  • Data Integrity and Confidentiality: By enabling secure, encrypted communication channels initiated from the device's secure element, the secure SIM technology directly contributes to the integrity and confidentiality of data transmitted between the IoT device and its cloud endpoint. Data is cryptographically protected from the device's secure boundary. 

Remote Management Feature 

The Remote Management Feature within Thales IoT SAFE facilitates the secure maintenance and lifecycle management of deployed IoT devices. Given that IoT devices are frequently deployed in environments where physical access is challenging or impractical, Over-the-Air (OTA) management capabilities are essential. This feature supports the following technical operations: 

  • Secure Firmware and Software Updates: OTA updates for device firmware and application software are delivered with cryptographic integrity and authenticity checks. Updates are digitally signed using keys derived from or validated by the secure SIM, ensuring that only legitimate and untampered software is executed on the device. 

  • Credential Lifecycle Management: This includes the secure renewal of cryptographic keys and certificates, as well as the immediate or scheduled revocation of compromised device identities. This functionality is critical for maintaining cryptographic agility and responding to security incidents effectively. 

  • Configuration Management: Device-specific parameters, operational settings, and security policies can be updated remotely. These configuration updates are typically transmitted over secure channels and validated by the device's secure element. 

  • Diagnostic Data Retrieval: Mechanisms exist for the remote retrieval of device health status and basic diagnostic information, facilitating troubleshooting and operational monitoring. 

IoT Server Integration 

The IoT Server Integration component functions as the secure intermediary, orchestrating communication between SIM-equipped devices and various cloud providers or application platforms. This dedicated Thales IoT server manages the secure protocols and data flows: 

  • GSMA IoT SAFE Protocol Implementation: The Thales IoT server implements the server-side logic specified by the GSMA IoT SAFE standard. This includes handling the cryptographic handshakes and secure tunnel establishment protocols with the secure elements on the devices. This ensures compliance with the standard and enables interoperability within the GSMA IoT SAFE ecosystem. 

  • Secure Communication Tunneling: The server establishes and maintains secure, end-to-end communication tunnels from the device (transiting the cellular network) to the target cloud platform. This architecture provides data protection beyond the cellular network's inherent security. 

  • Data Routing and Protocol Adaptation: The IoT server routes inbound device telemetry to designated cloud endpoints. It can also perform necessary protocol transformations or payload adaptations if the receiving cloud platform's ingest mechanisms require a format different from the native GSMA IoT SAFE payload. 

  • Device Identity Verification Interface: It provides an API for cloud applications to query and verify device identities and associated credentials managed by the Thales system, enabling secure device onboarding and continuous authentication. 

Conformance to GSMA IoT SAFE Specifications 

Adherence to the GSMA IoT SAFE specifications is a foundational aspect of Thales IoT SAFE. This industry standard provides a standardized framework for utilizing a secure element (such as a SIM, eSIM, or iSIM) as a hardware root of trust for IoT applications. Conformance ensures devices can: 

  • Perform mutual (D)TLS authentication with a server using cryptographic keys exclusively managed by the secure element. 

  • Securely compute shared secrets for session encryption without exposing long-term private keys to the device's application layer. 

  • Leverage a standardized approach to device identity and key management, promoting interoperability across different MNOs and IoT platforms. 

By conforming to these specifications, Thales IoT SAFE contributes to a reduction in IoT security fragmentation, streamlining the deployment of cellular IoT solutions across diverse industrial and commercial sectors. This approach integrates robust, SIM-based security directly into the mobile network infrastructure, addressing critical IoT security challenges at an architectural level. 

1NCE Shop

Buy the 1NCE IoT Lifetime Flat now

Visit the 1NCE Shop and start connecting your IoT devices easily. Simply order your IoT SIM cards, choose the desired type of IoT SIM card and fill out all required forms. After the payment has been approved you get your cards within two to three business days. 

Newsletter

Get the latest news and IoT use cases