IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • Public Key Infrastructures for Trust and Authentication in the IoT


    Author(s): NĂSTASE, Lavinia

    Quick view | Full article | Citations | Views: 528


    Author(s) keywords: , , , , ,


    Reference keywords: , ,


    Abstract:

    The Internet of Things is a global infrastructure of smart electronic devices embedded with sensors with the purpose of collecting, processing, exchanging and delivering data. One of the main requirements of the IoT is that all the connected objects are available at any time. Since the complexity of this network constantly grows, security and privacy are vital for its development. The focus of this paper is on discussing a framework that leverages trust, authentication, encryption and integrity of data, by using a Public Key Infrastructure adapted to the IoT needs.



    References:

    [1]. F. Hu, “Trust and Trust Models for the IoT” in “Security and privacy in internet of things (IoTs)”, CRC Press, vol. 1. 2016.

    [2]. J. A. Buchmann, E. Karatsiolis, and A. Wiesmaier, Introduction to Public Key Infrastructures. 2013.

    [3]. K. Moriarty, S. Parkinson, A. Rusch, M. Scott, “PKCS #12: Personal Information Exchange Syntax v1.1”, RFC 7292, July 2014 [Online] Available: https://tools.ietf.org/html/rfc7292.

    [4]. W. Stallings, L. Brown, “Internet Authentication Applications” in “Computer Security – Principles and Practice”, third edition, Pearson, 2015, ch. 23, pp. 717–730.

    [5]. R. Buyya, A. V. Dastjerdi, “Security and Privacy in the Internet of Things” in “Internet of Things. Principles and Paradigms” in Elsevier, 2016, ch. 10, pp.183-199.

    [6]. M. Saadeh, A. Sleit, M. Qatawneh, and W. Almobaideen, “Authentication techniques for the internet of things: A survey,” Proc. - 2016 Cybersecurity Cyberforensics Conf. 2016, no. August, pp. 28–34, 2016.

    [7]. C. Doukas, I. Maglogiannis, V. Koufi, F. Malamateniou, and G. Vassilacopoulos, “Enabling data protection through PKI encryption in IoT m-Health devices,” IEEE 12th Int. Conf. Bioinforma. Bioeng. BIBE 2012, no. November, pp. 25–29, 2012.

    [8]. Standard X.509 v3 Certificate Extension Reference, [Online] Available: https://access.redhat.com/documentation/en-US/Red_Hat_Certificate_System/
    8.0/html/Admin_Guide/Standard_X.509_v3_Certificate_Extensions.html.

    [9]. M. Benantar, "The Public-Key Infrastructure Approach to Trust Establishment” in “Access control systems: Security, identity management and trust models,” Springer, 2006, ch.2, pp.84-104.



    Additional Information

    Article Title: Public Key Infrastructures for Trust and Authentication in the IoT
    Author(s): NĂSTASE, Lavinia
    Date of Publication: 2017-06-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2017.01.05
    Issue: Volume 6, Issue 1, Year 2017
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 51-56 (6 pages)



    Copyright

    Copyright ©2012-2019 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.