Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration

2021 ◽  
2012 ◽  
Vol 241-244 ◽  
pp. 3255-3259
Author(s):  
Qi Wu Wu ◽  
Ling Zhi Jiang

Security architecture is the key problem of each network construction, Internet of things (IoT) is no exception. Firstly, existing research results in relation to security architecture of IoT are summarized. Then, on the basis of the analysis of the IoT security problem, this paper discusses the network security service requirements of IoT. Finally, a novel hierarchical and flexible secure architecture for IoT is proposed, which includes the security perception layer, security network layer and security application layer. Meanwhile, it involves security services entity and security management entity. The security architecture can provide strong technical support for security construction of IoT.


2019 ◽  
Vol 18 (3) ◽  
pp. 1-21 ◽  
Author(s):  
Weiqiang Liu ◽  
Lei Zhang ◽  
Zhengran Zhang ◽  
Chongyan Gu ◽  
Chenghua Wang ◽  
...  
Keyword(s):  
Low Cost ◽  

Author(s):  
Tobias Mitterer ◽  
Leander B. Hormann ◽  
Hans-Peter Bernhard ◽  
Peter Priller ◽  
Hubert Zangl
Keyword(s):  

Author(s):  
Ali Al Mousa ◽  
Mohammad Al Qomri ◽  
Salman Al Hajri ◽  
Rachid Zagrouba ◽  
Sghaier Chaabani
Keyword(s):  

Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 855
Author(s):  
Tzung-Her Chen ◽  
Wei-Bin Lee ◽  
Hsing-Bai Chen ◽  
Chien-Lung Wang

Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server.


Author(s):  
P. Velmurugan ◽  
K. Senthil kumar ◽  
S.S. Sridhar ◽  
E. Gotham
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document