Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!

Znaleziono wyników: 3

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available remote Secure Onboarding and Key Management in Federated IoT Environments
EN
Many high-impact IoT scenarios, such as humanitarian assistance and disaster relief, public safety, and military operations, require the establishment of a secure federated IoT environment. One of the critical challenges in the implementation of federated IoT solutions involves establishing a secure and authenticated key management mechanism. We propose and validate in a laboratory environment a novel federated IoT onboarding and key management solution. Our dl-mOT protocol integrates an efficient identity-based mOT protocol with a distributed ledger in order to establish an anchor of trust between federation members.
EN
The federated nature of many high-impact IoT applications introduces several challenges from a security perspective. To address critical challenges related to the authentication and secure communication of Internet of Things devices operating in federated environments, we have developed a Lightweight Authentication and Key Exchange Protocol for Federated IoT (LAKEPFI). LAKEPFI provides a flexible authentication and cryptographic key exchange protocol based on Hyperledger Fabric, leverages the unique configuration fingerprint of an IoT device, and does not require secure storage space in participating IoT devices. Constructing a complex security protocol is an error-prone process. Therefore, it is essential to verify its security properties using various techniques. In this article, we discuss the formal modeling and verification of the security properties of LAKEPFI using verification tools such as Verifpal and Tamarin prover.
EN
The article describes the basic requirements of authentication systems used in Internet of Things networks, and problems and attacks that may hinder or even prevent the process of authentication. The current methods used in device authentication are also presented.
PL
W artykule opisano podstawowe wymagania systemów uwierzytelniania stosowanych w sieciach Internetu Rzeczy oraz problemy i ataki, które mogą utrudnić lub nawet uniemożliwić przeprowadzenie procesu uwierzytelniania. Przedstawiono również obecne metody stosowane w uwierzytelnianiu urządzeń Internetu Rzeczy.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.