Cellular IoT Modules & Chipsets Security Tracker (2024 Update)
(see all)
Product Details
Contact sales
- 38 cellular IoT module brands
- 13 cellular IoT chipset companies
- 10 regions
- 10 technology splits
- 16 industry verticals
- 150 unique model-level chipsets
- 737 unique model-level modules
Already a subscriber?
About the product
This Cellular IoT Modules & Chipsets Security Tracker (2024 Update) is a nested database that categorizes and classifies the shipments of cellular IoT modules and the embedded cellular IoT chipsets within those modules by security type (Hardware vs Non-Hardware) at the module model level.
29% of cellular IoT modules shipped in Q1 2024 had no dedicated security features, only 33% had hardware-based security, and 38% had a non-hardware-based security that relies on embedded software mechanisms or integrated features within existing hardware to create a secure environment. This is one of the key statistics from IoT Analytics updated in-depth Cellular IoT Modules & Chipsets Security Tracker (2024 Update), which provides a quarterly look at the shipments of the companies providing Security specification of IoT modules and chipsets for cellular IoT deployments. IoT module security is of particular interest right now in light of the US Congress’ 7 August 2023 letter to the US Federal Communications Commission (FCC) regarding the potential security risks of using Chinese cellular IoT modules.
Definitions
- Cellular IoT module: A cellular IoT module is a hardware component that enables IoT devices to connect to the internet using cellular networks. It comprises a cellular modem, a microcontroller unit (MCU), and embedded software that facilitate seamless communication between devices and the Internet. These modules utilize various generations of cellular technology, including 2G, 3G, 4G, or 5G, and Low Power Wide Area Network (LPWAN) technologies such as Narrowband IoT (NB-IoT) and LTE-M.
- Cellular IoT chipset: A cellular IoT chipset refers to a baseband processor embedded in a smart device (either directly or via a module) that enables and manages the device’s connectivity. It is designed specifically to allow IoT devices to connect to cellular networks.It is based on the 3GPP architecture, such as 4G, 5G, LTE-M, and NB-IoT
- Hardware Based Security : Hardware-based security refers to the use of dedicated hardware components to ensure device security, particularly through the use of secure elements embedded within the hardware. These hardware components serve as a foundation for creating secure environments, protecting device identities, encrypting communications, and ensuring the authenticity of devices.
- eSIM/iSIM-based HRoT: An eSIM is an integrated circuit that combines hardware, a secure element, and UICC software. These eSIMs are available in various form factors, including machine-to-machine form factor (MFF2), wafer-level chip scale packaging (WLCSP), and miniaturized leadless packages. Alternatively, iSIM is a type of eSIM where an integrated UICC (iUICC) with a secure element is manufactured into a system-on-chip (SoC) or system-in-package (SiP). Additionally, the embedded secure element within eSIM and iSIM secures connectivity and identity and serves as an HRoT for asymmetric encryption, ensuring secure end-to-end communication. The GSM Association’s (GSMA) IoT SAFE specifications utilize a single eSIM/iSIM as a hardware root of trust.
- HRoT for application security: Irrespective of embedded with eSIM or iSIM. These modules are embedded with a secure element, or iSIM, with two secure elements: one for securing connectivity and identity and another for application security.
- Non-Hardware Based Security: Non-hardware-based security relies on embedded software mechanisms or integrated features within existing hardware to create a secure environment. It ensures that processes run securely and that devices are protected from unauthorized access without the need for dedicated security hardware components.
- TrustZone: Arm’s TrustZone creates a secure environment for processes to run. It helps protect critical functions and sensitive data by establishing a trusted execution environment (TEE). This TEE ensures that only authorized software and processes can
- Secure boot: Secure boot is a security mechanism that ensures that only authorized firmware is loaded and executed on a device. Secure boot makes sure that systems are booted without any intrusions.
- Security-enhanced Linux (SELinux): SELinux is a Linux kernel security module that provides a security framework for controlling access to system resources. Control access to files, directories, processes, ports, and network traffic.
- Code/user data backup: Backing up code and user data from cellular IoT modules is crucial for preventing data loss or corruption, restoring data in case of failure or attack, and updating data without physical access
- Code/user data backup. Backing up code and user data from cellular IoT modules is crucial for protecting against data loss or corruption. It ensures that data can be restored in case of failure or attack and facilitates updates without needing physical access to the device.
- Other security. Additional security measures can include software-based encryption, secure data transfer protocols, and authentication mechanisms that protect the device and its communications from unauthorized access or tampering.
- No security. No security, refers to the absence of dedicated or non-dedicated hardware-based security. This means the module lacks features that could protect it from unauthorized access, tampering, or data breaches. As a result, devices using such modules are more vulnerable to cybersecurity threats and attacks.
Table of contents
Cellular IoT Module & Chipset Security Tracker (2024 Update) (EXCEL)
- Intro
- Module & Chipset Pivot
- Module & Chipset Model Level
- Shipment by Security Type
Included data
- 38 cellular IoT module brands
- 13 cellular IoT chipset companies
- 10 regions
- 10 technology splits
- 16 industry verticals
- 150 unique model-level chipsets
- 737 unique model-level modules
Related reading
A research article based on insights from this report will be published soon.
Companies mentioned
A selection of companies mentioned in the report.
AM Telecom
ASR
Cavli Wireless
Ccfrom
Cheerzing
China Mobile
Continental Automotive
Eigencomm
Fibocom
GCT
Gosuncn
H3C
Hisilicon
Huawei
Intel
Kyocera
LG Innotek
Lierda
Longsung
Marvell
Mediatek
Meig
MobileTek
Murata
Neoway
Pycom
Qualcomm
Quectel
Rinlink
Rolling Wireless
Ruijie
SIMCom
Sequans
Sercomm
Sierra Wireless
Sony Altair
Taiyo Yuden
Telit Cinterion
Titan
UNISOC
USR(Wenheg)
Ucloudy
Wistron Neweb
Wutong
XinYi
Yuge Technology
u-blox
Our insights are trusted by global industry leaders
Request your free demo
- Experience a walk-through of the tracker via screen share
- Get your specific questions addressed
- Explore how our research can add value to your organization
- Obtain detailed license and pricing information
- Receive a sample file in EXCEL
Any questions?
Get in touch with us easily. We are happy to help!
Prajwal Praveen
Sales Manager
Phone: +49 (0) 408 221 1722
Email: sales@iot-analytics.com