RED-DA Compliance

At iWave, we design and deliver telematics solutions that are secure by design and built to meet the highest European standards for data integrity and system reliability. Our cybersecurity software modules are developed to be fully compliant with EN 18031-1 and EN 18031-2, ensuring secure, auditable platform essential for today’s connected landscape.

As part of the Radio Equipment Directive (RED), Articles 3.3(d) and 3.3(e) specifies essential cybersecurity and privacy requirements for radio-connected devices including telematics systems used in vehicles, fleets, and other industrial platforms.

We have mapped the requirements of Article 3.3(d) and 3.3(e) of the Radio Equipment Directive to the EN 18031-1 and EN 18031-2 standards, which focus on software security and testing. iWave offers these modules for integration with the end application and enabling the total solution for RED-DA compliant.

CONTACT SALES

Documents

Documents

iWave Cybersecurity SW Modules EN 18031-1 EN 18031-2
Access control – This provides protection against unauthorized access to devices and their functions. ACM ACM
Authentication – This module verifies the identity of users & devices before granting access to sensitive functionalities or data within the equipment. AUM AUM
Secure boot & image signing – This ensures that software updates are authenticated, and their integrity is protected. SUM SUM
Secure storage – Device shall securely store security assets and protect them from unauthorized access. SSM SSM
Secure communication – This ensures that communication channels are secured to protect transit data. SCM SCM
Key Management – Offers protection of keys by storing it securely. CCK CCK
Log Management – This module tracks & records security, device relevant events. Provision for irreversible deletion of data when necessary. LGM & DLM
Additional security capabilities – Periodic security audit for vulnerability and assessment at hardware & software level. Limiting the exposure of network, other interfaces. GEC GEC
Security standards – AES-256 is used to encrypt data at rest. TLS 1.3 is used to encrypt the data in transit. ECC is used to sign the images for secure boot or OTA update. CRY CRY

img

Product Design Process

Our design process transforms your vision into reality with innovation, quality, and collaboration.

Learn More

img

Certification & Qualification

Ensuring Compliance, Quality, and Trust Through Certification & Qualification.

Learn More

img

Product Lifecycle Management

Ensuring Longevity, Reliability, and Seamless Product Evolution.

Learn More

img

Mechanical Services

Precision Engineering for Reliable, High-Performance Mechanical Solutions.

Learn More

video-thumbnail
youtube-play-icon
video-thumbnail
youtube-play-icon
video-thumbnail
youtube-play-icon
img

The Rise of Automotive Ethernet

Learn More
img

Telematics Solutions Lawn Mower

Learn More
img

OTA & Telematics for Connected Vehicles

Learn More
img

V2X On-Board Unit for V2X – Enhancing Safety

Learn More
img

Rugged Telematics Device for EV – Last Mile Trucks

Learn More
img

Rugged Telematics Device for EV – Last Mile Trucks

Learn More