Make things come alive in a secure way
Security of the Sigfox Network
Security comes with devices first. Security is also supported by radio technology. The communication between the base stations and the Sigfox Cloud, as well as the Sigfox cloud itself are secure, robust, trusted and scalable. At the chain end, IT platforms of customers are connected to the Sigfox Cloud using HTTPS encrypted interfaces.
The downlink process of Sigfox brings additional security robustness. When objects have their ears closed they can’t listen to anything that might be sent by a hacker. The fact that the objects choose when to communicate and at which frequency is protecting them from a hacker sending them a misplaced, unattended command.
Sigfox has gathered a team with lengthy experience in the industry that deals with all relevant aspects, from security by design to active operational measures. This addresses data protection in motion via measures built in the protocol (authentication, integrity, encryption, anti-replay, anti-jamming) data protection at rest via cryptographic storage of data and credentials in devices, base stations, and Sigfox Core Network.