Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Secure Provisioning for Achieving End-to-End Secure Communications
Publication

Publications

Secure Provisioning for Achieving End-to-End Secure Communications

Title
Secure Provisioning for Achieving End-to-End Secure Communications
Type
Article in International Conference Proceedings Book
Year
2019
Authors
Sousa, PR
(Author)
Other
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Resende, JS
(Author)
Other
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page Without ORCID
Conference proceedings International
Pages: 498-507
18th International Conference on Ad-Hoc Networks and Wireless (AdHoc-Now)
Luxembourg, LUXEMBOURG, OCT 01-03, 2019
Other information
Authenticus ID: P-00R-EK3
Abstract (EN): The growth of the Internet of Things (IoT) is raising significant impact in several contexts, e.g., in cities, at home, and even attached to the human body. This digital transformation is happening at a high pace and causing a great impact in our daily lives, namely in our attempt to make cities smarter in an attempt to increase their efficiency while reducing costs and increasing safety. However, this effort is being supported by the massive deployment of sensors throughout cities worldwide, leading to increase concerns regarding security and privacy. While some of these issues have already been tackled, device authentication remains without a viable solution, specially when considering a resilient decentralized approach that is the most suitable for this scenario, as it avoids some issues related to centralization, e.g., censorship and data leakage or profit from corporations. The provisioning is usually an arduous task that encompasses device configuration, including identity and key provisioning. Given the potential large number of devices, this process must be scalable and semi-autonomous, at least. This work presents a novel approach for provisioning IoT devices that adopts an architecture where other device acts as a manager that represents a CA, allowing it to be switched on/off during the provisioning phase to reduce single point of failure (SPOF) problems. Our solution combines One Time Password (OTP) on a secure token and cryptographic algorithms on a hybrid authentication system.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 10
Documents
We could not find any documents associated to the publication.
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-16 at 23:49:39 | Privacy Policy | Personal Data Protection Policy | Whistleblowing