Make things come alive in a secure way

Security of the Sigfox Network

Security of the Sigfox Network

Security comes with devices first. Security is also supported by radio technology. The communication between the base stations and the Sigfox Cloud, as well as the Sigfox cloud itself are secure, robust, trusted and scalable. At the chain end, IT platforms of customers are connected to the Sigfox Cloud using HTTPS encrypted interfaces.

Low frequency accuracy constraints on connected devices

Low frequency accuracy constraints on connected devices

A device transmits randomly anywhere within the operation band. There is no synchronization between the base station and the device.

High resistance to interferences

High resistance to interferences

SIGFOX has decided to implement three types of diversity scheme in order to make SIGFOX transmissions robust: time diversity, frequency diversity, space diversity.

Downlink connectivity

Downlink connectivity

The downlink process of Sigfox brings additional security robustness. When objects have their ears closed they can’t listen to anything that might be sent by a hacker. The fact that the objects choose when to communicate and at which frequency is protecting them from a hacker sending them a misplaced, unattended command.

Schema

Sigfox has gathered a team with lengthy experience in the industry that deals with all relevant aspects, from security by design to active operational measures. This addresses data protection in motion via measures built in the protocol (authentication, integrity, encryption, anti-replay, anti-jamming) data protection at rest via cryptographic storage of data and credentials in devices, base stations, and Sigfox Core Network.