By definition, IoT devices are constrained, remote, and exposed. We know that IoT will never be the epitome of security. Nevertheless, securing IoT devices is becoming increasingly important in a world filled with cyber attacks, and having the right protection in the right places and at the right levels for the right purpose is imperative. IOWA ensures that accepted, standardized, and state-of-the-art security practices and technologies are applied everywhere, adapting to your security objectives.
IOWA automates the management of connectivity, security, data feedback and firmware updates on IoT devices, which is a necessity for those who need to rationalize the cost of their IoT maintenance. IOWA makes it possible to create secure, scalable and interoperable devices that are based on the LwM2M standard, while minimizing their energy consumption. Our full implementation of Lightweight M2M 1.1 requires less than 30 KB of storage and less than 5 KB at runtime, which includes a set of standard objects.
IOWA is a software development kit, written in C, and designed to work on the most constrained STM32 platforms. It is capable of communicating over the most constrained networks. Extensive documentation, simple programming interfaces, and numerous code examples are just the beginning.
IOWA allows users to manage device lifecycle operations, including bootstrapping, provisioning, firmware updates, certificate swaps, and control commands. It features a powerful and easy application programming interface to create your first LwM2M device in a just few hours. IOWA enables users to reliably transmit data to any cloud using any standard IPSO objects, or custom objects, via any LwM2M data formats (SENML CBOR, CBOR, JSON, etc.). Additionally, IOWA is compliant with all LwM2M servers in all LwM2M versions, including 1.0.2, 1.1, and 1.2.
IOWA supports any operating system, and is easy to port to bare metal using a simple C abstraction layer. It has been optimized for queue mode operations such as eDRX, and supports LwM2M over COAP/UDP, CoAP/TCP, CoAP/NIDD, CoAP/SMS. It also supports advanced CoAP block, and download. Thanks to a simple API (support mbedTLS, wolfSSL, tinyTLS), IOWA is able to support any encryption library optimized for DTLS CID support. Finally, IOWA provides OSCORE end-to-end encryption, is agnostic of physical layers, and even works on high-latency networks.
The Perfect Complement to ALASKA
Backed by ALASKA, our cloud-based device management platform, we enable users to manage millions of devices throughout their entire life cycles, from startup to firmware updates to decommissioning.