SSL/TLS SSH Embedded IoT Security Suite

Don't Get Burned!

Enable Robust
Embedded IoT Security Capabilities in Minutes!

Security is Our Standard.

IoT data privacy and security is no laughing matter. Data breaches can be devastating and it’s often inadequate encryption technology and configuration that’s to blame.

The NetBurner SSH, SSL/TLS Embedded IoT Security Suite™ is shipped standard with all of our current generation of devices. You can rest assured that NetBurner has your back as you design and deploy secure, scalable embedded networks. Our easy-to-use tools and amazing technical support team make implementation simple.

Our powerful yet small-footprint security solution enables robust embedded data encryption protecting IoT from unauthorized device monitoring, control, re-configuration, eavesdropping or manipulation.

Defend IoT from...

Eavesdropping / Interception / Hijacking

Protect from Man-in-the-Middle Attacks, IoT Communication Protocol Hijacking, and Network Reconnaissance.

Nefarious Activity / Abuse

Denial of Service, Malware, Manipulation of Hardware & Software or Information, Targeted and Brute Force Attacks

Built-in Embedded IoT Security You Can Trust

Top-Tier SSL/TLS Libraries

NetBurner’s Embedded IoT Security Suite™ uses the wolfSSL SSL/TLS libraries for its size, speed and robust capabilities. Full-featured and trusted embedded security.
Wolf SSL Logo

Key Points

  • TLS Version v1.2 (v1.3 coming soon)
  • Secure Webpages with HTTPS
  • Secure File Transfer with FTPS
  • Secure Websockets
  • Secure Data Communications with SSL/TLS as a Server or Client
  • Secure Shell (SSH) Capability
  • Small Footprint for Lightweight Embedded Performance
  • World-Class Technical Support with NetBurner’s US-Based In-House Team

Features

  • Support for ECC & RSA Certificates with SSL/TLS
  • Support for Onboard, Auto-Generated, Self-Signed SSL/TLS Certificates
  • SSL/TLS Session Resumption
  • SSL/TLS Peer Verification
  • SSL/TLS Client Certificates
  • SSL/TLS Key Sizes from 1024 to 4096 Bits
  • SSH Key Sizes from 512 to 4096 Bits
  • Customize to Suit Any Application with Low-Cost Development Kits
  • Use the Latest SSL/TLS Ciphers

Example Code

Our Embedded IoT Security Suite™ comes with example code to get you up and running fast:

  • Two Serial Port Server with User Authentication, Certificate & Key Access
  • Several SSL/TLS examples show how to run your device run as a server, client, HTTPS web server, FTPS server, store keys and certs on an external SD card, send/receive mail securely, & more.
  • PEM Encoded Certificates & Public- Private Key Pairs (OpenSSH style)

SSL/TLS Implementation Overview

Why NetBurner's Embedded IoT Security Suite™?​

NetBurner SSL/TLS

  • SSL/TLS libraries written for performance & ease of use
  • Includes the latest ciphers for v1.2 
  • SSL/TLS integrated with our TCP/IP stack and web server for secure web pages with HTTPS in just a few function calls
  • 32-bit NetBurner processor platforms can easily handle the demands of connecting and transmitting data using SSL/TLS, unlike 8-bit or 16-bit microcontrollers

NetBurner SSH (Secure Shell)

  • SSH enables secure data exchange between embedded network devices on a network or the Internet
  • Replace TELNET and other insecure remote shells with a secure alternative
  • Server authentication (username and password) is required for security but the administrator can allow anonymous operation

Embedded IoT Security FAQ

NetBurner provides SSL/TLS libraries which are the foundation upon which most commercial and industrial security protocols and architectures are built.

SSL/TLS is a cryptographic protocol that provides security and ensures data integrity for transmissions made over a TCP/IP network.

SSL/TLS is primarily used to enable devices to serve secure web pages (HTTPS) over a local network or the Internet. IoT edge node data, control commands, configurations and other data payloads can be reliably encrypted thus preventing eavesdropping, hijacking and abuse.

SSH is a crytpographic protocol that allows for secure data exchange even over an insecure network. SSH enables data to be exchanged between two network devices over a secure channel— it’s a secure replacement for TELNET and other insecure remote shells. SSH supports remote command-line interface, logins, and command execution, and other network services.

Unfortunately, no. Datagram Transport Layer Security (DTLS) is required for a UDP configuration. DTLS is one of NetBurner’s upcoming security suite features.

NetBurner’s upcoming security features include TLS Version 1.3, DTLS (Datagram Transport Layer Security) support for UDP users, WolfSSH, and FIPS 140-2 Certification (Federal Information Processing Standards Publication 140-2). Sign up to our newsletter to keep up to date on this and many other important enhancements.

  • TLS_RSA_WITH_RC4_128_SHA
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
  • TLS_RSA_WITH_AES_128_CBC_SHA
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA
  • TLS_RSA_WITH_AES_256_CBC_SHA
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA
  • TLS_RSA_WITH_AES_128_CBC_SHA256
  • TLS_RSA_WITH_AES_256_CBC_SHA256
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
  • TLS_ECDH_ECDSA_WITH_RC4_128_SHA
  • TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
  • TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
  • TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
  • TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
  • TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
  • TLS_ECDH_RSA_WITH_RC4_128_SHA
  • TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
  • TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
  • TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
  • TLS_ECDHE_RSA_WITH_RC4_128_SHA
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
  • TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
  • TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  • TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
  • TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
  • TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
  • TLS_RSA_WITH_AES_128_CCM
  • TLS_RSA_WITH_AES_256_CCM
  • TLS_DHE_RSA_WITH_AES_128_CCM
  • TLS_DHE_RSA_WITH_AES_256_CCM
  • TLS_RSA_WITH_AES_128_CCM_8
  • TLS_RSA_WITH_AES_256_CCM_8
  • TLS_DHE_RSA_WITH_AES_128_CCM_8
  • TLS_DHE_RSA_WITH_AES_256_CCM_8
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
  • TLS_RSA_WITH_AES_128_GCM_SHA256
  • TLS_RSA_WITH_AES_256_GCM_SHA384
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

Have questions or don't see what you're looking for?

Let us know at sales@netburner.com, or submit your request with this form.

NetBurner Embedded IoT Security Articles