Loading…

Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)

This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches f...

Full description

Saved in:
Bibliographic Details
Published in:Future internet 2020-08, Vol.12 (8), p.138
Main Authors: Poulter, Andrew John, Ossont, Steven J., Cox, Simon J.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383
cites cdi_FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383
container_end_page
container_issue 8
container_start_page 138
container_title Future internet
container_volume 12
creator Poulter, Andrew John
Ossont, Steven J.
Cox, Simon J.
description This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.
doi_str_mv 10.3390/fi12080138
format article
fullrecord <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_ac7cc874bcff4d109f66a220d69d4f86</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A641109895</galeid><doaj_id>oai_doaj_org_article_ac7cc874bcff4d109f66a220d69d4f86</doaj_id><sourcerecordid>A641109895</sourcerecordid><originalsourceid>FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383</originalsourceid><addsrcrecordid>eNpdkd1KXDEQxw_FQsV60yc40BsVVvN18nEp1toFoaLudchJJmuW3WSbZJG960P0CfskRle0NHMxYfj_f5nJdN0XjE4pVejMB0yQRJjKD90-VkpNBoXo3j_3T91hKQvUDlWEc7HfPV5GMy5DnPf1Afo7sJsM_axAn3z_bRvNKth-6iDWULe9T_lFNo0VcoT6LLp_aOby9_efWfmPcgurVBts7UxLNznVZNOyP7q7nd0cf-4-erMscPiaD7rZ98v7ix-T659X04vz64llCNXJIKQ3RoxA-SCtQNjQkTGC6QCcKOTRCIyCYMIb8EOb0yGvpKOYUukElfSgm-64LpmFXuewMnmrkwn6pZDyXJtcg12CNlZYKwUbrffMYaQ854YQ5LhyzEveWF93rHVOvzZQql6kTY6tfU0Y5YQrykhTne5Uc9OgIfpUs7EtHLTPTBF8aPVzznB7QqqhGU52BptTKRn8W5sY6efF6vfF0ieaLJR4</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2436269342</pqid></control><display><type>article</type><title>Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)</title><source>Access via ProQuest (Open Access)</source><source>ABI/INFORM Global</source><creator>Poulter, Andrew John ; Ossont, Steven J. ; Cox, Simon J.</creator><creatorcontrib>Poulter, Andrew John ; Ossont, Steven J. ; Cox, Simon J.</creatorcontrib><description>This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.</description><identifier>ISSN: 1999-5903</identifier><identifier>EISSN: 1999-5903</identifier><identifier>DOI: 10.3390/fi12080138</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Command and control ; Data security ; identity ; Internet of Things ; IoT ; Methods ; MQTT ; QR codes ; Read only memory ; ROM ; Security management ; Security systems ; Servers ; Software ; Third party</subject><ispartof>Future internet, 2020-08, Vol.12 (8), p.138</ispartof><rights>COPYRIGHT 2020 MDPI AG</rights><rights>2020. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383</citedby><cites>FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383</cites><orcidid>0000-0003-3864-7072 ; 0000-0002-3438-3981</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2436269342/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2436269342?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,11688,25753,27924,27925,36060,37012,44363,44590,74895,75126</link.rule.ids></links><search><creatorcontrib>Poulter, Andrew John</creatorcontrib><creatorcontrib>Ossont, Steven J.</creatorcontrib><creatorcontrib>Cox, Simon J.</creatorcontrib><title>Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)</title><title>Future internet</title><description>This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.</description><subject>Command and control</subject><subject>Data security</subject><subject>identity</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>Methods</subject><subject>MQTT</subject><subject>QR codes</subject><subject>Read only memory</subject><subject>ROM</subject><subject>Security management</subject><subject>Security systems</subject><subject>Servers</subject><subject>Software</subject><subject>Third party</subject><issn>1999-5903</issn><issn>1999-5903</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkd1KXDEQxw_FQsV60yc40BsVVvN18nEp1toFoaLudchJJmuW3WSbZJG960P0CfskRle0NHMxYfj_f5nJdN0XjE4pVejMB0yQRJjKD90-VkpNBoXo3j_3T91hKQvUDlWEc7HfPV5GMy5DnPf1Afo7sJsM_axAn3z_bRvNKth-6iDWULe9T_lFNo0VcoT6LLp_aOby9_efWfmPcgurVBts7UxLNznVZNOyP7q7nd0cf-4-erMscPiaD7rZ98v7ix-T659X04vz64llCNXJIKQ3RoxA-SCtQNjQkTGC6QCcKOTRCIyCYMIb8EOb0yGvpKOYUukElfSgm-64LpmFXuewMnmrkwn6pZDyXJtcg12CNlZYKwUbrffMYaQ854YQ5LhyzEveWF93rHVOvzZQql6kTY6tfU0Y5YQrykhTne5Uc9OgIfpUs7EtHLTPTBF8aPVzznB7QqqhGU52BptTKRn8W5sY6efF6vfF0ieaLJR4</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Poulter, Andrew John</creator><creator>Ossont, Steven J.</creator><creator>Cox, Simon J.</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-3864-7072</orcidid><orcidid>https://orcid.org/0000-0002-3438-3981</orcidid></search><sort><creationdate>20200801</creationdate><title>Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)</title><author>Poulter, Andrew John ; Ossont, Steven J. ; Cox, Simon J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Command and control</topic><topic>Data security</topic><topic>identity</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>Methods</topic><topic>MQTT</topic><topic>QR codes</topic><topic>Read only memory</topic><topic>ROM</topic><topic>Security management</topic><topic>Security systems</topic><topic>Servers</topic><topic>Software</topic><topic>Third party</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Poulter, Andrew John</creatorcontrib><creatorcontrib>Ossont, Steven J.</creatorcontrib><creatorcontrib>Cox, Simon J.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Future internet</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Poulter, Andrew John</au><au>Ossont, Steven J.</au><au>Cox, Simon J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)</atitle><jtitle>Future internet</jtitle><date>2020-08-01</date><risdate>2020</risdate><volume>12</volume><issue>8</issue><spage>138</spage><pages>138-</pages><issn>1999-5903</issn><eissn>1999-5903</eissn><abstract>This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/fi12080138</doi><orcidid>https://orcid.org/0000-0003-3864-7072</orcidid><orcidid>https://orcid.org/0000-0002-3438-3981</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1999-5903
ispartof Future internet, 2020-08, Vol.12 (8), p.138
issn 1999-5903
1999-5903
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_ac7cc874bcff4d109f66a220d69d4f86
source Access via ProQuest (Open Access); ABI/INFORM Global
subjects Command and control
Data security
identity
Internet of Things
IoT
Methods
MQTT
QR codes
Read only memory
ROM
Security management
Security systems
Servers
Software
Third party
title Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T21%3A41%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enabling%20the%20Secure%20Use%20of%20Dynamic%20Identity%20for%20the%20Internet%20of%20Things%E2%80%94Using%20the%20Secure%20Remote%20Update%20Protocol%20(SRUP)&rft.jtitle=Future%20internet&rft.au=Poulter,%20Andrew%20John&rft.date=2020-08-01&rft.volume=12&rft.issue=8&rft.spage=138&rft.pages=138-&rft.issn=1999-5903&rft.eissn=1999-5903&rft_id=info:doi/10.3390/fi12080138&rft_dat=%3Cgale_doaj_%3EA641109895%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2436269342&rft_id=info:pmid/&rft_galeid=A641109895&rfr_iscdi=true