// Add "Blog" content group datalayer Cellular IoT Modules & Chipsets Security Tracker (2024 Update)
Home > Reports & Databases > IoT Connectivity & Hardware > Cellular IoT Modules & Chipsets Security Tracker (2024 Update)
Security Tracker

Cellular IoT Modules & Chipsets Security Tracker (2024 Update)

Global IoT Modules & Chipsets Security Tracker - Product Icon
A structured security tracker that categorizes and classifies the shipments of cellular IoT modules and the embedded cellular IoT chipsets within those modules by security type (Hardware vs Non-Hardware) at the module model level.
N
Document type: XLSX
N
Published: September 2024
N
Main author: Satyajit Sinha
(see all)

Tracker preview:

Product Details

Contact sales

→ Buy now · See pricing

  • 38 cellular IoT module brands
  • 13 cellular IoT chipset companies
  • 10 regions
  • 10 technology splits
  • 16 industry verticals
  • 150 unique model-level chipsets
  • 737 unique model-level modules

About the product

This Cellular IoT Modules & Chipsets Security Tracker (2024 Update) is a nested database that categorizes and classifies the shipments of cellular IoT modules and the embedded cellular IoT chipsets within those modules by security type (Hardware vs Non-Hardware) at the module model level.

29% of cellular IoT modules shipped in Q1 2024 had no dedicated security features, only 33% had hardware-based security, and 38% had a non-hardware-based security that relies on embedded software mechanisms or integrated features within existing hardware to create a secure environment. This is one of the key statistics from IoT Analytics updated in-depth Cellular IoT Modules & Chipsets Security Tracker (2024 Update), which provides a quarterly look at the shipments of the companies providing Security specification of IoT modules and chipsets for cellular IoT deployments. IoT module security is of particular interest right now in light of the US Congress’ 7 August 2023 letter to the US Federal Communications Commission (FCC) regarding the potential security risks of using Chinese cellular IoT modules.

Definitions

  • Cellular IoT module: A cellular IoT module is a hardware component that enables IoT devices to connect to the internet using cellular networks. It comprises a cellular modem, a microcontroller unit (MCU), and embedded software that facilitate seamless communication between devices and the Internet. These modules utilize various generations of cellular technology, including 2G, 3G, 4G, or 5G, and Low Power Wide Area Network (LPWAN) technologies such as Narrowband IoT (NB-IoT) and LTE-M.
  • Cellular IoT chipset: A cellular IoT chipset refers to a baseband processor embedded in a smart device (either directly or via a module) that enables and manages the device’s connectivity. It is designed specifically to allow IoT devices to connect to cellular networks.It is based on the 3GPP architecture, such as 4G, 5G, LTE-M, and NB-IoT
  • Hardware Based Security : Hardware-based security refers to the use of dedicated hardware components to ensure device security, particularly through the use of secure elements embedded within the hardware. These hardware components serve as a foundation for creating secure environments, protecting device identities, encrypting communications, and ensuring the authenticity of devices.
  • eSIM/iSIM-based HRoT: An eSIM is an integrated circuit that combines hardware, a secure element, and UICC software. These eSIMs are available in various form factors, including machine-to-machine form factor (MFF2), wafer-level chip scale packaging (WLCSP), and miniaturized leadless packages. Alternatively, iSIM is a type of eSIM where an integrated UICC (iUICC) with a secure element is manufactured into a system-on-chip (SoC) or system-in-package (SiP). Additionally, the embedded secure element within eSIM and iSIM secures connectivity and identity and serves as an HRoT for asymmetric encryption, ensuring secure end-to-end communication. The GSM Association’s (GSMA) IoT SAFE specifications utilize a single eSIM/iSIM as a hardware root of trust.
  • HRoT for application security: Irrespective of embedded with eSIM or iSIM. These modules are embedded with a secure element, or iSIM, with two secure elements: one for securing connectivity and identity and another for application security.
  • Non-Hardware Based Security: Non-hardware-based security relies on embedded software mechanisms or integrated features within existing hardware to create a secure environment. It ensures that processes run securely and that devices are protected from unauthorized access without the need for dedicated security hardware components.
  • TrustZone: Arm’s TrustZone creates a secure environment for processes to run. It helps protect critical functions and sensitive data by establishing a trusted execution environment (TEE). This TEE ensures that only authorized software and processes can
  • Secure boot: Secure boot is a security mechanism that ensures that only authorized firmware is loaded and executed on a device. Secure boot makes sure that systems are booted without any intrusions.
  • Security-enhanced Linux (SELinux): SELinux is a Linux kernel security module that provides a security framework for controlling access to system resources. Control access to files, directories, processes, ports, and network traffic.
  • Code/user data backup: Backing up code and user data from cellular IoT modules is crucial for preventing data loss or corruption, restoring data in case of failure or attack, and updating data without physical access
  • Code/user data backup. Backing up code and user data from cellular IoT modules is crucial for protecting against data loss or corruption. It ensures that data can be restored in case of failure or attack and facilitates updates without needing physical access to the device.
  • Other security. Additional security measures can include software-based encryption, secure data transfer protocols, and authentication mechanisms that protect the device and its communications from unauthorized access or tampering.
  • No security. No security, refers to the absence of dedicated or non-dedicated hardware-based security. This means the module lacks features that could protect it from unauthorized access, tampering, or data breaches. As a result, devices using such modules are more vulnerable to cybersecurity threats and attacks.

Table of contents

Cellular IoT Module & Chipset Security Tracker (2024 Update) (EXCEL)

  • Intro
  • Module & Chipset Pivot
  • Module & Chipset Model Level
  • Shipment by Security Type

Authors

Satyajit Sinha

Included data

  • 38 cellular IoT module brands
  • 13 cellular IoT chipset companies
  • 10 regions
  • 10 technology splits
  • 16 industry verticals
  • 150 unique model-level chipsets
  • 737 unique model-level modules

Related reading

Companies mentioned

A selection of companies mentioned in the report.

AM Telecom

ASR

Cavli Wireless

Ccfrom

Cheerzing

China Mobile

Continental Automotive

Eigencomm

Fibocom

GCT

Gosuncn

H3C

Hisilicon

Huawei

Intel

Kyocera

LG Innotek

Lierda

Longsung

Marvell

Mediatek

Meig

MobileTek

Murata

Neoway

Pycom

Qualcomm

Quectel

Rinlink

Rolling Wireless

Ruijie

SIMCom

Sequans

Sercomm

Sierra Wireless

Sony Altair

Taiyo Yuden

Telit Cinterion

Titan

UNISOC

USR(Wenheg)

Ucloudy

Wistron Neweb

Wutong

XinYi

Yuge Technology

u-blox

Our insights are trusted by global industry leaders

abb_logo_grey
samsung_logo_grey
Microsoft_logo_grey
logo-sony
Siemens logo

Request your free demo

  • Experience a walk-through of the tracker via screen share
  • Get your specific questions addressed
  • Explore how our research can add value to your organization
  • Obtain detailed license and pricing information
  • Receive a sample file in EXCEL

    IMPORTANT: Please tick the box prior to sending your request. All fields are required.

    Any questions?

    Get in touch with us easily. We are happy to help!

    Prajwal Praveen-min

    Prajwal Praveen
    Sales Manager

    Phone: +49 (0) 408 221 1722
    Email: sales@iot-analytics.com