2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) 2018
DOI: 10.1109/worlds4.2018.8611563
|View full text |Cite
|
Sign up to set email alerts
|

IoT Infrastructure Secured by TLS Level Authentication and PKI Identity System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The CAcertificate issuing authority signs these digital certificates which are to be issued to the IoT edge devices for their authentic identity's sake [75]. Certain concrete policies and a set of attributed roles that are to be strictly followed by the interacting entities in a communicating network are defined in a PKI-public key infrastructure [76]. It is responsible for managing such trust developing digital certificates.…”
Section: Iot Devices and Their Mutual-authentication Authorization Tr...mentioning
confidence: 99%
“…The CAcertificate issuing authority signs these digital certificates which are to be issued to the IoT edge devices for their authentic identity's sake [75]. Certain concrete policies and a set of attributed roles that are to be strictly followed by the interacting entities in a communicating network are defined in a PKI-public key infrastructure [76]. It is responsible for managing such trust developing digital certificates.…”
Section: Iot Devices and Their Mutual-authentication Authorization Tr...mentioning
confidence: 99%
“…Regardless, using CAs introduces single points of failure since they are centralized. To overcome this, several researchers have developed PKI for IoT networks [70,71,72,73]. For example, in [70] the authors propose three different methods for distributing CAs over a blockchains using Etherium smartcontracts and even the Emercoin infrastructure.…”
Section: Authentication and Identificationmentioning
confidence: 99%