Design the most secure version of your IoT product
IoT security must be central to the design of each product and every stage of your project.
Security by design
We incorporate the security aspect from the earliest product design stage
Smart object security at every stage of the IoT pathway
Identify the risks that threaten your solution and define the appropriate security level.
Find out how robust your product or solution is and detect any security vulnerabilities.
Adjust your product to the desired level of security.
Guarantee that your solution remains free from vulnerabilities over time.
Security priorities integrated into projects
for treating swimming pool water.
Analysis and proposal of a secure IoT architecture
Device control via a mobile app
Real-time data reporting
Cybersecurity research work
Rtone can combine applied research with engineering to design a secure connected solution. We incorporate the latest advances in cybersecurity and privacy into every stage of the IoT pathway across all our activities.
Five stages in securing your smart product
Preliminary diagnostic: hardware, software, wireless communication, mobile and cloud
Security level based on international standards (OWASP ASVS)
Level 1: Standard tests targeting specific vulnerabilities.
Level 2: Hacking the product.
Supporting the hardware, firmware and software teams
Complete approach: development, supervision, reviews, tests etc.
Specific: monitoring the latest vulnerabilities, generating alerts
IoT security training
Security at the heart of our work
Rtone, a contributor to the Paclido project, is committed to security
- Develop lightweight encryption algorithms and protocols for IoT
- Develop a detection system for attacks targeting IoT
- Uses in home automation, smart city, industry 4.0
- Algorithms submitted at the end of 2018 to the NIST LWC standardisation competition
- Deployment planned for public lighting in Saint Quentin en Yvelines in late 2020
Cryptographic Protocols and Algorithms for
the Internet of Things
With the support of
I have a smart object project
Countering security flaws in connected objects
Many people underestimate the risks of intrusion, hacking and ransomware.
And yet these risks can be prevented with simple actions:
- Anticipation, based on the principle of Security by Design
- Testing the security of your connected object
To find out more,
> Read the article (french)
Our other skills