Bootstrapping IoT authentication using aggregated local knowledge and novel self-contained triangulation methodologies

2022 IEEE 29th Annual Software Technology Conference (STC)(2022)

引用 1|浏览2
暂无评分
摘要
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed and evaluated. The value of authentication along multiple disjoint paths becomes very clear. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another then the length of the authentication paths is of little importance.
更多
查看译文
关键词
Authentication,Edge Computing,Industrial IoT Cybersecurity,Post-Quantum Security,PKI/TTP
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要