Skip to main content

Optimized security levels for electronic products

With our Anti Tamper Radio (ATR) you don't have to worry about contingencies and all possible physical attackers. The ATR detects physical tampering inside devices during operation. These requirements are established for the implementation of use cases in the Internet of Things and are on their way to being defined as state of the art. In the future, moreover, supply chain monitoring and unambiguous verification of freedom from tampering will also become essential for electronic components and IoT devices. By integrating the ATR, tampering with the product can be identified, for example, between production and commissioning. This enables a new level of security with reduced requirements for transport and storage.

Contact

Advantages/ added values

PHYSEC ATR secures supply chains and operations so that your products arrive and operate tamper-free at the customer's site.

Tamper protection: through award-winning innovation (German IT Security Award 2018, European Cyber Security Award 2021)

Tamper protection: through award-winning innovation (German IT Security Award 2018, European Cyber Security Award 2021)

 

Lower total cost of ownership: PHYSEC significantly reduces the requirement for other protection methods.

Lower total cost of ownership: PHYSEC significantly reduces the requirement for other protection methods.

 

Securing supply chains: Instead of securing all logistics processes, the ATR protects your product from the inside out.

Securing supply chains: Instead of securing all logistics processes, the ATR protects your product from the inside out.

 

State-of-the-art sensor technology in active operation: PHYSEC ATR protects hardware from manipulation but also detects changes of any kind

State-of-the-art sensor technology in active operation: PHYSEC ATR protects hardware from manipulation but also detects changes of any kind

 

Real-time system audit: remote verification of the integrity of the most complex physical environments

Real-time system audit: remote verification of the integrity of the most complex physical environments

 

Secure value chain in digitization

For the roll-out of smart meter gateways, the BSI has defined the requirements for the SiLke (Secure Supply Chain) and the SiMon (Secure Assembler). In addition to packaging, specifications are defined for transport and storage, which is intended to prevent manipulation of the smart meter gateways.

In the future, possible backdoors through insecure hardware or tampering in the supply chain should be adequately covered in an ISMS. It is advisable to include additional approaches to consider cyber-physical threats. This can be achieved, for example, through compliance with the standards of the European Union Agency for Cyber Security (ENISA) (Guidelines for securing the Internet of Things) and to DIN SPEC 27072 (German Institute for Standardization, 2019).

Fusion of digital and physical security

In practice, a major challenge is not only to secure applications digitally, but also to be able to guarantee their physical integrity. How are applications that consist of both digital and physical components secured?

Answering this key question is especially non-trivial as soon as unauthorized access to system components cannot be ruled out for reasons of cost-sensitive supply chains (unguarded transports) or shared, public or generally untrustworthy deployment environments. Examples of digital systems where physical integrity is a core component of the security concept include payment and withdrawal terminals in finance, control units in increasingly autonomous cars, machine control for hyperautomated plants, decentralized energy infrastructure components for e-mobility and renewable energies, telecommunications components and edge servers for an increasingly dense and powerful mobile network, or defense systems.

Sensitive data, secure please!

In the above examples, invasive attackers can obtain or manipulate a variety of sensitive data. This includes personal data, cryptographic keys, credentials and passwords, intellectual property data and software, and infrastructure data, which are of utmost importance to national security. As global crises (natural disasters, pandemics, war) increase, supply chains are under particular pressure, so opportunities for unauthorized access cannot be ruled out.

 

Manipulation at bank terminals reliably detected

In cooperation with the Ruhr University Bochum, PHYSEC GmbH has developed a system to protect ATMs and similar security-relevant devices against manipulation in a cost-effective and reliable manner. The product consists of Anti-Tamper-Radio (ATR) modules that can be integrated into the housing and emit electromagnetic waves that can be measured. From these measured signals a unique radiometric fingerprint is generated, without which access to sensitive data is not possible. The slightest mechanical manipulation of the device destroys this fingerprint, thus preventing improper data access.

The standard hardware used in this process and its simple implementation in the systems results in a system that is not only highly reliable, but also cost-effective in preventing the manipulation of security-relevant devices. Thanks to the successful use of the modules on ATMs, they are also to be used in other security-relevant areas in the future, such as critical infrastructure.

Central innovation program for small and medium-sized enterprises

What our network says

Quote 1

"In the future of loT and edge computing, it will be more and more difficult to ensure that physical assets are protected by their operational environment. So we clearly see the need for a self-defending system based on PHYSEC's innovative surveillance technology."

Secunet Security
Networks AG

Quote 2

"These young German innovators show an impressive combination of entrepreneurial and scientific-technical skills and are developing a technology with the potential to impact the world."

MIT Technology Review

Quote 3

"We have been working and developing together with PHYSEC in the field of Internet of Things since 2018. Together, we have quickly and reliably established an area-wide LoRaWAN network within Bochum and use the data hub 'IoTree' to visualize and evaluate received data - without compromising on IT security."

Municipal Utility
Bochum Netz GmbH

Learn more about our services

LoRaWAN Starter Project

Find out here which comprehensive services we offer to support you with your LoRaWAN pilot project.

IoTree Functions

Due to its high flexibility and diverse functions, IoTree supports users in particular from the utility industry

Consulting

Find out here how our experts can support you around the digitalization of your utility infrastructure and the associated regulatory framework.

Start now and get advice from our experts!

Manar Al-Askary 

Product Manager SEAL

 

Contact