首页> 外文期刊>International Journal of Information Security >Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture
【24h】

Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture

机译:建立和验证 IoT 设备的安全密钥:在基于云的体系结构上使用 P3 连接模型

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

IoT devices are slowly turning out to be an essential part of our everyday lives. These devices perform one operation, and they specialize in doing so. When communicating with these devices, we need to set up a secured key preventing unauthorized communications. We have been using the plug-and-play model for electronic devices for decades. These IoT devices fall into the same realm. The plug-pair-play connection model follows the same principle so that the user does not feel the added pressure of remembering a complex password or rely on a default credential. It helps to generate a secret that is only known to the device and its user. We used elliptic curve cryptography to circumvent the resource limitations on the device. The model establishes a zero-trust pattern where all requests and responses are validated and verified before being processed. This paper provides a unique way to set up a secret key for each user and device pair without much user interaction. The model sets the path to end-to-end secured communication.
机译:物联网设备正慢慢成为我们日常生活的重要组成部分。这些设备执行一项操作,并且专门用于执行此操作。与这些设备通信时,我们需要设置一个安全密钥,以防止未经授权的通信。几十年来,我们一直在电子设备中使用即插即用模式。这些物联网设备属于同一领域。即插即用连接模型遵循相同的原则,因此用户不会因记住复杂密码或依赖默认凭据而感到额外的压力。它有助于生成只有设备及其用户知道的密钥。我们使用椭圆曲线加密来规避设备上的资源限制。该模型建立了一个零信任模式,在该模式中,所有请求和响应在处理之前都经过验证和验证。本文提供了一种独特的方法,无需太多用户交互即可为每个用户和设备对设置密钥。该模型设置了端到端安全通信的路径。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号