Public Key Infrastructures for Trust and Authentication in the IoT
Author(s): NĂSTASE, Lavinia
Author(s) keywords: authentication, certificates, encryption, IoT security, PKI, trust models
Reference keywords: authentication, cybersecurity, data encryption
Abstract:
The Internet of Things is a global infrastructure of smart electronic devices embedded with sensors with the purpose of collecting, processing, exchanging and delivering data. One of the main requirements of the IoT is that all the connected objects are available at any time. Since the complexity of this network constantly grows, security and privacy are vital for its development. The focus of this paper is on discussing a framework that leverages trust, authentication, encryption and integrity of data, by using a Public Key Infrastructure adapted to the IoT needs.
References:
[1]. F. Hu, “Trust and Trust Models for the IoT” in “Security and privacy in internet of things (IoTs)”, CRC Press, vol. 1. 2016.
[2]. J. A. Buchmann, E. Karatsiolis, and A. Wiesmaier, Introduction to Public Key Infrastructures. 2013.
[3]. K. Moriarty, S. Parkinson, A. Rusch, M. Scott, “PKCS #12: Personal Information Exchange Syntax v1.1”, RFC 7292, July 2014 [Online] Available: https://tools.ietf.org/html/rfc7292.
[4]. W. Stallings, L. Brown, “Internet Authentication Applications” in “Computer Security – Principles and Practice”, third edition, Pearson, 2015, ch. 23, pp. 717–730.
[5]. R. Buyya, A. V. Dastjerdi, “Security and Privacy in the Internet of Things” in “Internet of Things. Principles and Paradigms” in Elsevier, 2016, ch. 10, pp.183-199.
[6]. M. Saadeh, A. Sleit, M. Qatawneh, and W. Almobaideen, “Authentication techniques for the internet of things: A survey,” Proc. - 2016 Cybersecurity Cyberforensics Conf. 2016, no. August, pp. 28–34, 2016.
[7]. C. Doukas, I. Maglogiannis, V. Koufi, F. Malamateniou, and G. Vassilacopoulos, “Enabling data protection through PKI encryption in IoT m-Health devices,” IEEE 12th Int. Conf. Bioinforma. Bioeng. BIBE 2012, no. November, pp. 25–29, 2012.
[8]. Standard X.509 v3 Certificate Extension Reference, [Online] Available: https://access.redhat.com/documentation/en-US/Red_Hat_Certificate_System/
8.0/html/Admin_Guide/Standard_X.509_v3_Certificate_Extensions.html.
[9]. M. Benantar, "The Public-Key Infrastructure Approach to Trust Establishment” in “Access control systems: Security, identity management and trust models,” Springer, 2006, ch.2, pp.84-104.
Article Title: Public Key Infrastructures for Trust and Authentication in the IoT
Author(s): NĂSTASE, Lavinia
Date of Publication: 2017-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2017.01.05
Issue: Volume 6, Issue 1, Year 2017
Section: Studies and Analysis of Cybercrime Phenomenon
Page Range: 51-56 (6 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.