Secure Internet of Things Identities

Gunasekar M May 04, 2022 | 11.30 AM Technology

The Internet-of-Things is extremely important today, and security is essential for a smooth running IoT. To achieve this, it is crucial we solve the main challenge of secure identities for constrained IoT devices and find efficient ways to deal with the many identity technologies in use.

Security is critical for a trustworthy Internet-of-Things. To achieve this, it is crucial we solve the main challenge of secure identities for constrained IoT devices and find efficient ways to deal with the many identity technologies in use. Different ecosystems have disparate needs and practices. Yet it is clear that automation and zero touch mass registration is necessary for scaling up to billions of devices.

Figure 1 Secure Internet Of Things Identities

Figure 1 is shows the IOT Authentications. These are all various types of secure connections. The IoT is a network of physical objects that can interact with other Internet-enabled systems and devices to share information and perform actions.

How can secure environments be provided for IoT? Different ecosystems have unique needs and practices. We believe the diversity will continue for at least the foreseeable future, and the best way is to focus on brokering of existing, successful technologies, as a needed solution bridging different ecosystems.

The importance of security in IoT

Internet of Things comprises billions of connected devices, most of which are small size, low cost, low power, constrained in terms of processing power and storage, operate unattended and can be expected to run more than ten years.

Close-to-zero cost for roll-out, provisioning, and operation will be necessary, calling for automated processes.

Security and privacy are among the major concerns for businesses adopting IoT. This increases with the growing significance of IoT in corporate, government, and critical infrastructure contexts. New IoT devices being deployed in new use cases brings significant security challenges.

Device identity

The device identity is normally a boot strap credential together with a device identifier. The credential is generated or set during manufacturing and used to securely download other sets of credentials used for things like authentication, connectivity, management. The device identifier does not need to be secret but (a part of) the credentials need to be.

Root of trust

Bootstrapping a secure system or device involves a chain of steps, where each step relies on the correctness and security of the previous one, also called a chain of trust. At the end of the chain we assume or verify the correctness of the last step – this step becomes the Root of Trust (RoT). It is implemented so that is it very hard to break that trust.

References:

  1. https://www.ericsson.com/en/blog/2017/3/secure-iot-identities
  2. https://www.intertrust.com/resources/creating-secure-iot-device
  3. https://www.electronicspecifier.com/news/blog/secure-iot-identities

Cite this article:

Gunasekar M (2022),Secure Internet Of Things Identities, Anatechmaz, p.p 81

Recent Post

Blog Archive