Enabling the secure use of dynamic identity for the internet of things — using the Secure Remote Update Protocol (SRUP)
Enabling the secure use of dynamic identity for the internet of things — using the Secure Remote Update Protocol (SRUP)
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.
C2, Identity, Internet of Things, IoT, MQTT, NFC, QR Code, Security, command and control
1-15
Poulter, Andrew John
8bbad929-4d27-43c7-ba22-8c737127e8c5
Ossont, Steven J
6b903ec2-7bae-4a56-9c21-eea0a70bfa2b
Cox, Simon
0e62aaed-24ad-4a74-b996-f606e40e5c55
18 August 2020
Poulter, Andrew John
8bbad929-4d27-43c7-ba22-8c737127e8c5
Ossont, Steven J
6b903ec2-7bae-4a56-9c21-eea0a70bfa2b
Cox, Simon
0e62aaed-24ad-4a74-b996-f606e40e5c55
Poulter, Andrew John, Ossont, Steven J and Cox, Simon
(2020)
Enabling the secure use of dynamic identity for the internet of things — using the Secure Remote Update Protocol (SRUP).
Future Internet, 12 (8), , [138].
(doi:10.3390/fi12080138).
Abstract
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.
Text
futureinternet-12-00138
- Version of Record
More information
Submitted date: 20 July 2020
e-pub ahead of print date: 15 August 2020
Published date: 18 August 2020
Additional Information:
Funding Information:
Funding: This research was wholly funded by the United Kingdom Defence Science and Technology Laboratory (Dstl). Dstl is a part of the U.K. Ministry of Defence.
Publisher Copyright:
© 2020 by the authors.
Keywords:
C2, Identity, Internet of Things, IoT, MQTT, NFC, QR Code, Security, command and control
Identifiers
Local EPrints ID: 443462
URI: http://eprints.soton.ac.uk/id/eprint/443462
ISSN: 1999-5903
PURE UUID: 29b93bde-1461-4390-950b-c69c44bc148d
Catalogue record
Date deposited: 26 Aug 2020 16:35
Last modified: 16 Mar 2024 09:05
Export record
Altmetrics
Contributors
Author:
Andrew John Poulter
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics