Loading…
Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches f...
Saved in:
Published in: | Future internet 2020-08, Vol.12 (8), p.138 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383 |
---|---|
cites | cdi_FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383 |
container_end_page | |
container_issue | 8 |
container_start_page | 138 |
container_title | Future internet |
container_volume | 12 |
creator | Poulter, Andrew John Ossont, Steven J. Cox, Simon J. |
description | This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system. |
doi_str_mv | 10.3390/fi12080138 |
format | article |
fullrecord | <record><control><sourceid>gale_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_ac7cc874bcff4d109f66a220d69d4f86</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A641109895</galeid><doaj_id>oai_doaj_org_article_ac7cc874bcff4d109f66a220d69d4f86</doaj_id><sourcerecordid>A641109895</sourcerecordid><originalsourceid>FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383</originalsourceid><addsrcrecordid>eNpdkd1KXDEQxw_FQsV60yc40BsVVvN18nEp1toFoaLudchJJmuW3WSbZJG960P0CfskRle0NHMxYfj_f5nJdN0XjE4pVejMB0yQRJjKD90-VkpNBoXo3j_3T91hKQvUDlWEc7HfPV5GMy5DnPf1Afo7sJsM_axAn3z_bRvNKth-6iDWULe9T_lFNo0VcoT6LLp_aOby9_efWfmPcgurVBts7UxLNznVZNOyP7q7nd0cf-4-erMscPiaD7rZ98v7ix-T659X04vz64llCNXJIKQ3RoxA-SCtQNjQkTGC6QCcKOTRCIyCYMIb8EOb0yGvpKOYUukElfSgm-64LpmFXuewMnmrkwn6pZDyXJtcg12CNlZYKwUbrffMYaQ854YQ5LhyzEveWF93rHVOvzZQql6kTY6tfU0Y5YQrykhTne5Uc9OgIfpUs7EtHLTPTBF8aPVzznB7QqqhGU52BptTKRn8W5sY6efF6vfF0ieaLJR4</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2436269342</pqid></control><display><type>article</type><title>Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)</title><source>Access via ProQuest (Open Access)</source><source>ABI/INFORM Global</source><creator>Poulter, Andrew John ; Ossont, Steven J. ; Cox, Simon J.</creator><creatorcontrib>Poulter, Andrew John ; Ossont, Steven J. ; Cox, Simon J.</creatorcontrib><description>This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.</description><identifier>ISSN: 1999-5903</identifier><identifier>EISSN: 1999-5903</identifier><identifier>DOI: 10.3390/fi12080138</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Command and control ; Data security ; identity ; Internet of Things ; IoT ; Methods ; MQTT ; QR codes ; Read only memory ; ROM ; Security management ; Security systems ; Servers ; Software ; Third party</subject><ispartof>Future internet, 2020-08, Vol.12 (8), p.138</ispartof><rights>COPYRIGHT 2020 MDPI AG</rights><rights>2020. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383</citedby><cites>FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383</cites><orcidid>0000-0003-3864-7072 ; 0000-0002-3438-3981</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2436269342/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2436269342?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,11688,25753,27924,27925,36060,37012,44363,44590,74895,75126</link.rule.ids></links><search><creatorcontrib>Poulter, Andrew John</creatorcontrib><creatorcontrib>Ossont, Steven J.</creatorcontrib><creatorcontrib>Cox, Simon J.</creatorcontrib><title>Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)</title><title>Future internet</title><description>This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.</description><subject>Command and control</subject><subject>Data security</subject><subject>identity</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>Methods</subject><subject>MQTT</subject><subject>QR codes</subject><subject>Read only memory</subject><subject>ROM</subject><subject>Security management</subject><subject>Security systems</subject><subject>Servers</subject><subject>Software</subject><subject>Third party</subject><issn>1999-5903</issn><issn>1999-5903</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpdkd1KXDEQxw_FQsV60yc40BsVVvN18nEp1toFoaLudchJJmuW3WSbZJG960P0CfskRle0NHMxYfj_f5nJdN0XjE4pVejMB0yQRJjKD90-VkpNBoXo3j_3T91hKQvUDlWEc7HfPV5GMy5DnPf1Afo7sJsM_axAn3z_bRvNKth-6iDWULe9T_lFNo0VcoT6LLp_aOby9_efWfmPcgurVBts7UxLNznVZNOyP7q7nd0cf-4-erMscPiaD7rZ98v7ix-T659X04vz64llCNXJIKQ3RoxA-SCtQNjQkTGC6QCcKOTRCIyCYMIb8EOb0yGvpKOYUukElfSgm-64LpmFXuewMnmrkwn6pZDyXJtcg12CNlZYKwUbrffMYaQ854YQ5LhyzEveWF93rHVOvzZQql6kTY6tfU0Y5YQrykhTne5Uc9OgIfpUs7EtHLTPTBF8aPVzznB7QqqhGU52BptTKRn8W5sY6efF6vfF0ieaLJR4</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Poulter, Andrew John</creator><creator>Ossont, Steven J.</creator><creator>Cox, Simon J.</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-3864-7072</orcidid><orcidid>https://orcid.org/0000-0002-3438-3981</orcidid></search><sort><creationdate>20200801</creationdate><title>Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)</title><author>Poulter, Andrew John ; Ossont, Steven J. ; Cox, Simon J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Command and control</topic><topic>Data security</topic><topic>identity</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>Methods</topic><topic>MQTT</topic><topic>QR codes</topic><topic>Read only memory</topic><topic>ROM</topic><topic>Security management</topic><topic>Security systems</topic><topic>Servers</topic><topic>Software</topic><topic>Third party</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Poulter, Andrew John</creatorcontrib><creatorcontrib>Ossont, Steven J.</creatorcontrib><creatorcontrib>Cox, Simon J.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Future internet</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Poulter, Andrew John</au><au>Ossont, Steven J.</au><au>Cox, Simon J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP)</atitle><jtitle>Future internet</jtitle><date>2020-08-01</date><risdate>2020</risdate><volume>12</volume><issue>8</issue><spage>138</spage><pages>138-</pages><issn>1999-5903</issn><eissn>1999-5903</eissn><abstract>This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/fi12080138</doi><orcidid>https://orcid.org/0000-0003-3864-7072</orcidid><orcidid>https://orcid.org/0000-0002-3438-3981</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1999-5903 |
ispartof | Future internet, 2020-08, Vol.12 (8), p.138 |
issn | 1999-5903 1999-5903 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_ac7cc874bcff4d109f66a220d69d4f86 |
source | Access via ProQuest (Open Access); ABI/INFORM Global |
subjects | Command and control Data security identity Internet of Things IoT Methods MQTT QR codes Read only memory ROM Security management Security systems Servers Software Third party |
title | Enabling the Secure Use of Dynamic Identity for the Internet of Things—Using the Secure Remote Update Protocol (SRUP) |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T21%3A41%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Enabling%20the%20Secure%20Use%20of%20Dynamic%20Identity%20for%20the%20Internet%20of%20Things%E2%80%94Using%20the%20Secure%20Remote%20Update%20Protocol%20(SRUP)&rft.jtitle=Future%20internet&rft.au=Poulter,%20Andrew%20John&rft.date=2020-08-01&rft.volume=12&rft.issue=8&rft.spage=138&rft.pages=138-&rft.issn=1999-5903&rft.eissn=1999-5903&rft_id=info:doi/10.3390/fi12080138&rft_dat=%3Cgale_doaj_%3EA641109895%3C/gale_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c400t-578faa7be3658c701a3b442135e6290f0be43e747faef5199d0f98d31338d7383%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2436269342&rft_id=info:pmid/&rft_galeid=A641109895&rfr_iscdi=true |