Security and Connectivity for IoT Devices

Menu

Machine to Machine

Home / Machine to Machine

Machine to Machine Communications

Embedded devices are increasingly connected to the Internet and called upon to communicate in meaningful ways with corporate IT servers. The Allegro EdgeAgent Suite aids your engineering team in building powerful connected embedded devices using industry-standard communications protocols.

Allegro EdgeAgent Suite

Click on the image to enlarge

Embedded HTTP Client-Server

Allegro offers technology specifically built for the embedded market to deliver HTTP server capabilities. Used in over 250 million devices, RomPager® is the industry’s leading embedded Web Server in the market. Not far behind in distribution, RomWebClient™ provides powerful embedded HTTP client capabilities allowing your network-enabled M2M device to query remote servers for the latest information.

Embedded TLS Client-Server

TLS (Transport Layer Security) is used to create an authenticated and encrypted channel, often referred to as an encrypted tunnel, between two endpoints on an unsecured network. Allegro’s Secure Transport Layer toolkit (RomSTL™) provides both Client and Server support for TLS in addition to DTLS capabilities.

Embedded Certificate Management

RomCert™ is a platform-independent implementation of the Online Certificate Status Protocol (OCSP) and the Simple Certificate Enrollment Protocol (SCEP) and makes embedding security certificate management into resource sensitive embedded systems and consumer electronics fast, easy and reliable while decreasing time to market.

Embedded SSH Client-Server

SSH provides encrypted communications between hosts over an insecure network. Allegro’s SSH embedded Client and Server (RomSShell™) offers a range of client authentication options other than X.509 public-key certificates which require a fully functioning public key infrastructure.

Embedded XML

Leverage 10+ man-years of XML product development in your embedded design with the use of Allegro’s field-proven RomXML® toolkit. Allegro’s RomXML® toolkit addresses the primary need for embedded XML support by efficiently translating between pre-defined C-language structures and XML-based representations.

Embedded Web Services

Increasingly, device manufacturers are faced with building complex communications technologies into their products. Allegro’s RomXML Plus™ is a field-proven product that enables your embedded device to efficiently communicate with corporate IT servers or other embedded devices utilizing a range of protocols and industry-standard formats.

Cryptography

The Allegro EdgeAgent Suite makes embedding standards-based security protocols into resource sensitive embedded systems and consumer electronics fast, easy and reliable. The Allegro Cryptography Engine (ACE™) is a cryptographic library module specifically engineered to meet the critical needs of embedded computing systems in addition to fulfilling the requirements needed for FIPS level 2 validation. The module provides embedded systems developers with a common software interface to enable bulk encryption and decryption, message digests, digital signature creation and validation, and key generation and exchange. Suite B is an advanced standard for cryptography that defines algorithms and strengths for encryption, hashing, calculating digital signatures, and key exchange. ACE™ includes a platform-independent, government validated implementation of the NSA Suite B defined suite of cryptographic algorithms.

Machine to Machine (M2M) Components

RomPager®

RomPager® is a full-featured HTTP 1.0/1.1 Web server toolkit that offers IPv4 and IPv6 operation, CGI-style user exit support, an internal security database, optional file support, and PageBuilder HTML offline compiler. The PageBuilder compiler dramatically reduces development time, coding effort, and potential errors by converting HTML into compilable source code. The compiler provides full support for HTML (2.0, 3.2, 4.0 and 5.0), XHTML, JavaScript, object compression, application compression,

RomWebClient™

The RomWebClient™ toolkit is a full-featured HTTP 1.0/1.1 Web client that retrieves and stores objects from any remote Web server using HTTP over IPv4 or IPv6. Objects can be in any format and are stored in memory or in an optional file system. The toolkit also supports caching, cookies, HTTP pipelining capabilities, and advanced HTTP streaming.

RomSTL™

RomSTL™ is a small, resource sensitive TLS client and server solution specifically engineered for embedded systems. RomSTL™ is pre-integrated with the full suite of RomPager products making it easy to envoke TLS as needed. RomSTL™ supports the latest RFC standards for TLS 1.0, TLS 1.1, and TLS 1.2 secure server and client sessions. The toolkit is hardware and software platform agnostic and written from the ground up for efficiency. The encryption protocols interoperate with any secure browser or server and include RSA, RC4, DES, 3DES, SHA, AES, and Suite B algorithms.

RomCert™

RomCert™ is a platform-independent implementation of the Online Certificate Status Protocol (OCSP) and the Simple Certificate Enrollment Protocol (SCEP) and makes embedding security certificate management into resource sensitive embedded systems and consumer electronics fast, easy, and reliable while decreasing time to market.

RomSShell™

RomSShell™ is an embedded Secure Shell version 2 (SSH) toolkit. SSH provides encrypted communications between hosts over an insecure network. RomSShell™ offers a range of client authentication options in addition to X.509 public-key certificates. RomSShell™ can also be used for port forwarding (sometimes called SSH tunneling), allowing you to arbitrarily tunnel secure TCP connections. RomSShell™ also supports the latest RFCs for implementing Suite B with Secure Shell.

RomXML Plus™

The RomXML® toolkit is a small eXtensible Markup Language (XML) implementation that enables your embedded device to send (frame) and receive (parse) XML documents. Using XML in your embedded designs provides for free-format interchange of data and is widely accepted in the device management, remote sensing, and enterprise IT communities. Allegro’s RomXML® has been designed from the ground up for use in embedded devices that often have limited resources. Written in ANSI-C, the toolkit offers built-in capabilities to convert internal data between C language structures and XML documents. The RomXOAP toolkit builds upon the capabilities of RomXML® and offers design engineers a comprehensive solution for creating connectivity between embedded designs and enterprise IT environments utilizing standards-based SOAP technology. Available as stand-alone toolkits or tightly integrated with the Secure IoT Suite, RomXML® and RomXOAP provide the foundation for enabling embedded devices with XML, SOAP, XML-RPC, REST, and Web Services capabilities.

Allegro Cryptography Engine (ACE™)

The Allegro Cryptography Engine (ACE™) is a cryptographic library module specifically engineered to meet the requirements needed for FIPS level 2 validation. The module provides developers with a common software API to enable bulk encryption and decryption, message digests, digital signature creation and validation, and key generation and exchange. Suite B is an advanced standard for cryptography that defines algorithms and strengths for encryption, hashing, calculating digital signatures, and key exchange. ACE™ includes a platform independent, government validated implementation of the NSA Suite B defined suite of cryptographic algorithms.

IoMT Devices Security: Ensuring Patient Safety & Privacy

Dive into the critical aspect of securing Internet of Medical Things (IoMT) devices, a cornerstone of healthcare innovation, in our insightful article by Loren Shade on embeddedcomputing.com. This article sheds light on the unique risks that IoMT devices face,...

Securing the Future of Healthcare: IoMT Device Protection

Explore the IoMT risks associated with medical devices and the countermeasures IoMT device manufacturers can take to ensure patient safety and privacy in our guest article written by Loren Shade on embeddedcomputing.com. Read the Article Allegro highlights the...

Allegro Software Wishes You Happy Holidays

Allegro Software wishes you a Happy Holidays and a wonderful New Year. We appreciate your support and look forward to serving you in 2024. Our team will be monitoring emails and inquiries throughout the holidays, please reach out if you have questions or need...

Best Practices for Managing IoT Related Risks

Allegro’s “Best Practices” document addresses the topic of IoT security related risks by taking a closer look at Critical Requirements and Functional Implementation.

7 Key Elements of Proactive IoT Security

All types of Internet of Things (IoT) devices are under attack. They are routinely recruited as unwitting members of botnets used for Distributed Denial of Service (DDOS) attacks, hosting various malware, and extracting sensitive data. Why are hackers drawn to these...

Open Source Issues in Mergers and Acquisitions

Open Source Issues in Mergers & Acquisitions In a merger or acquisition in which a technology company is the target, the target company’s software is often a material – and perhaps even the principal – asset of the deal. Often, this software was developed using...
Our Resources
Allegro Software Wishes You Happy Holidays

Allegro Software Wishes You Happy Holidays

Allegro Software wishes you a Happy Holidays and a wonderful New Year. We appreciate your support and look forward to serving you in 2024. Our team will be monitoring emails and inquiries throughout the holidays, please reach out if you have questions or need...

read more

Let’s Talk IoT Security

Implementing IoT device security can be a challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design. Click the button below to schedule a one-on-one web conference to discuss your security needs.

Download Allegro’s Playbook

  • This field is for validation purposes and should be left unchanged.

Contact Us Today

  • This field is for validation purposes and should be left unchanged.