Documents
Documents
| Features | Details |
|---|---|
| Secure Boot |
iWave telematics products which are built around NXP i.MX processors make use of the security features of these SoCs. Hardware-level security features like High Assurance Boot (HAB), Advanced High Assurance Boot (AHAB) ensure system integrity from power on. This guarantees only authorized, cryptographically signed firmware loads, preventing unauthorized code execution and mitigating malware. |
| Secure Storage |
Within all iWave Telematics devices, critical data, cryptographic keys, and sensitive information are shielded by robust, encrypted storage mechanisms, providing essential data confidentiality and integrity. This ensures that even if a device is compromised or physically stolen, the stored data remains protected. We use secure, encrypted storage to protect your data in full compliance with GDPR standards. This enables Vehicle data could be stored safely, with strict access controls and data retention policies. |
| Authentication |
iWave Telematics devices incorporate powerful password-based authentication mechanisms that verify the identity of users and connected systems. This fundamental control ensures secure access and prevents unauthorized access through the wired / wireless media. |
| AppArmor Access Control |
iWave Telematics devices utilize AppArmor Access Control to enforce granular, mandatory access control policies for applications. By enforcing application-specific profiles, we effectively limit program capabilities, upholding the principle of least privilege and significantly reducing the attack surface. |
| Secure Communication |
Secure Communication safeguards data in transit by encrypting it using industry-standard protocols such as TLS 1.3, IPSec, and SSL. This protects against eavesdropping, tampering, and man-in-the-middle attacks across wired, wireless, and cloud environments. Whether data is flowing between devices, applications, or external services, secure communication ensures both confidentiality and integrity Secure communication over the CAN (Controller Area Network) interface is essential to protect in-vehicle networks from message spoofing, tampering, and unauthorized access. Since traditional CAN lacks built-in security, modern approaches use message authentication codes (MACs), encryption, and node authentication to ensure data integrity and authenticity. This is possible with the integrated hardware secure module present in iWave Telematics Products. These protections are critical for preventing attacks like replay, injection, or man-in-the-middle within safety-critical systems. iWave SecureCAN module provides the needed protection against these attacks. |
| Key and Certificate Management |
iWave’s Telematics solution integrates a secure and scalable Key & Certificate Management system to establish trust, enable authentication, and protect data across connected vehicle ecosystems. This framework ensures that all devices, servers, and communication endpoints are securely authenticated using digital certificates and cryptographic keys. |
| Logging and Monitoring |
iWave’s Telematics solution features an integrated Logging and Monitoring framework designed to deliver real-time visibility, enhanced security, and operational intelligence across connected vehicle systems. This feature captures critical system events, communication logs, security alerts, and performance metrics to support diagnostics, compliance, and threat detection. |



