Cybersecurity is shifting into the focus of European regulation. According to the EU Radio Equipment Directive, by August 2025, products with radio technology and internet access must protect networks and personal data and prevent fraud. The EN18031 standard is designed to assist manufacturers in implementation. Part 2 looks into its application.
The EU Cyber Resilience Act (CRA) introduces completely new cybersecurity requirements for electronic devices. It was published in the Official Journal of the EU in November 2024 and is therefore applicable law. However, no standards exist for it yet. A transitional period is therefore expected to apply until December 2027, after which new products will have to comply with the CRA.
Until then, the Radio Equipment Directive (RED) is intended to enhance cybersecurity, at least for all wireless devices. To this end, the EU amended the RED in 2022, supplementing Article 3(3), to now define the following three sub-points:
The deadline for implementation now runs until August 1, 2025. After that, no wireless devices may be placed on the EU market unless they meet the cybersecurity requirements of the RED.
The EN 18031 standard translates the cybersecurity aspects of the RED into specific testing procedures and was developed by the CENELEC standards organization on behalf of the EU. In October 2024, CENELEC submitted EN 18031 to the European Commission for review. The standard was harmonized in January 2025, meaning that new products no longer have to be certified by an accredited testing service provider (Figure 5). A self-declaration of conformity is sufficient.
Figure 5. Whether a productās conformity can be assessed in-house depends on the existence of a harmonized standard. Otherwise, certified service providers (Notified Bodies) come into play. (Source: European Commission ā RED Guide [4])
The conformity test is illustrated here taking the example of Würth Elektronikās IoT WiFi module Cordelia-I [5]. The WiFi module is fully compliant with the RED, including the cybersecurity extension 2022/30/EU from January 2022. The Cordelia-I module complies with IEEE 802.11 b/g/n, operates in the 2.4 GHz band, and is characterized by the following features:
According to the RED, cybersecurity for wireless devices such as radio modules must be ensured in accordance with Article 3(3). For the Cordelia-I radio module, only Article 3(3)(d) ā protection of the network is relevant, as neither personal data under 3(3)(e) nor financial data under 3(3)(f) is processed. It follows that Cordelia-I must be tested in accordance with EN 18031-1:2024.
The core requirements of EN 18031-1:2024 for a wireless device in terms of cybersecurity are:
The standard provides assistance for testing using decision trees. A cascading question structure is used, with āyesā and ānoā answers provided. If the answer is āyesā, meaning the result is ānot applicableā, the respective test is not required for the product under test. For the final question in the cascade, the āyesā answer means a āpassā for the test. A ānoā answer results in a āfail,ā and corrective action may be required.
The cybersecurity space is volatile and constantly evolving, for example, with the CRA coming into effect at the end of 2027. It is important to conduct a cybersecurity risk analysis at an early stage of the design process and to continuous this analysis throughout the product lifecycle. The implementation of cybersecurity involves more than just hardware and software. āPoliciesā also play an important role, such as a vulnerability reporting system, software updates, ease of installation and maintenance, etc. The goal must be āsecurity by designā.
When designing a security concept for an embedded device, several key questions have to be asked and answered: Which asset needs protection? What does the threat look like? Which security objective do we have? What do we need to achieve it? Figure 6 illustrates these security requirements for different assets.
Figure 6. Design of a security concept for an embedded device with various assets to be protected. (Source: Würth Elektronik)
The current state of cybersecurity measures in a typical IoT application encompasses a range of security elements:
These general measures to ensure cybersecurity have been implemented in the Cordelia-I WiFi module (Figure 7). The WiFi radio module includes the following security features:
Figure 7. The Cordelia-I WiFi module from Würth Elektronik offers a wide range of features to ensure cybersecurity in IoT applications.
To ensure a secure connection to the cloud, the device and the cloud should perform mutual authentication, followed by exchanging a session key, which is then used to encrypt the communication channel. This is usually done using the TLS protocol.
To establish a mutual TLS connection, the following cryptographic elements must be present on the device and in the cloud. The assets must also be properly aligned with each other.
On the device side, these are:
The process of storing these parameters on the end device is known as ādevice provisioningā.
On the cloud side this entails:
The process of storing these parameters on the cloud endpoint is known as ācloud onboardingā. These cryptographic values must be stored securely on both the device and the cloud endpoint. Disclosure of these values at any stage of the device manufacturing lifecycle can compromise security. Human interaction with these cryptographic assets often poses the greatest threat. Therefore, the following steps must be followed to ensure maximum security.
The Cordelia-I module with the QuarkLink platform enables a secure cloud connection through zero touch device provisioning and secure cloud onboarding (Figure 8). In addition, full device management ā including remote cloud migration ā can be carried out throughout the lifecycle of a device [6].
In this process, the device is configured with all the parameters required to connect to the cloud platform, including cryptographic resources, without any need for human intervention.
This involves configuring multiple parameters, including the cryptographic assets on the device as described above. The Cordelia-I module, together with the QuarkLink platform, enables zero-touch provisioning. Each module is delivered with a unique, pre-installed, and hardware-based tamper-proof key set.
The private key is securely linked to the hardware and cannot be read out by the application. The application software can only access the public key and use the private key for further cryptographic operations.
Figure 8. Enrolment to a cloud via zero-touch provisioning is handled by the QuarkLink IoT security platform from Crypto Quantique. Secure data exchange then takes place directly between the IoT device and the cloud. (Source: Würth Elektronik)
Literature:
[4] European Commission: Guide to the Radio Equipment Directive 2012/53/EU. https://ec.europa.eu/docsroom/documents/33162
[5] Cordelia-I WiFi IoT radio module from Würth Elektronik: https://www.we-online.com/de/components/products/CORDELIA-I
[6] Product Guide: Wireless Connectivity & Sensors from Würth Elektronik: https://www.we-online.com/de/components/products/wco



