A Blockchain-based Distributed Access Control for IoT

Slides:



Advertisements
Similar presentations
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Advertisements

The Buddy System : A Distributed Reputation System Based on Social Structure Universität Karlsruhe Stefan Fähnrich 1, Philipp Obreiter 1, Birgitta König-Ries.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
Wireless and Security CSCI 5857: Encoding and Encryption.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
Joint Session SG Security / OpenHAN SG Security WG Chair: Darren Reece Highfill
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
Reputation Systems Thomas Choi COMP 5104 March 5, 2008.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Bitcoin College - Learn Bitcoin, Have Fun, & Be Part Of The Movement Why You’ll be Telling Your Grandchildren About Bitcoin.
Cryptocurrencies: challenges and caveats Khaled Baqer Cambridge University.
Block Chain 101 May 2017.
Challenges in Designing a Blockchain Platform
ISO’s standardization approach to security, privacy and trust
Blockchain In Financial Services
Hardware-rooted Trust for Secure Key Management & Transient Trust
Lightweight Mutual Authentication for IoT and Its Applications
Distributed Financial Technology in Payments
Blockchain Introduction
Virtual currency? Crypto-currency? Internet Money? Property?
Moog VeriPart®: Secure, Authentic Parts for On-Demand Supply Chains
Towards an optimized BlockChain for IoT
Leveraging Blockchain Technology in Legal Work Process
ECIP-1017.
Blockchains and Cryptocurrencies: What Financial Planners Need to Know
Generating revenue from surplus solar power using cryptocurrency
Team 8: Andres Florez, Paul Lee, Junaedy Liem, Lyanna Lim
Zcash Mining – A Guide For Beginners. Zcash (also known as ZEC and seventeenth most valued cryptocurrency with market capitalization of $500 million)
What Is Blockchain Technology?. blockchain is a decentralized technology. A global network of computers uses blockchain technology to jointly manage the.
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
5 Benefits of Blockchain for Startups - IQVIS
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
U.S. Federal e-Authentication Initiative
Soummya Kar NAS, Data Science Symposium Jun. 14, 2018
Focus Group 3: Blockchain and digitalisation
Outline Distributed Mutual Exclusion Distributed Deadlock Detection
NEECOM – May 16, 2018 Todd L. Gould, CEO
N-Guard: a Solution to Secure Access to NFC tags
BLOCKCHAIN BASICS & LEGAL ISSUES
Jason cooper blockchain specialist Unlock blockchain 14 January 2018
Introduction, Adoption And challenges
XinFin Blockchain for global Trade and Finance
Setting the Stage for a Community Blockchain Incubator
Public Key Infrastructure from the Most Trusted Name in e-Security
Distributed Ledger Technology (DLT) and Blockchain
Blockchain Alexander Prenta 9/27/2018.
The Living Blockchain Craig Sellars, Co-Founder of Omni Tether vAtomic
Blockchain help. Why Blockchain help? Blockchain help, since its inception, has been providing cutting-edge technology solutions and in-depth domain expertise.
Introduction to Blockchain
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Global Crypto News - Latest Bitcoin & Blockchain News l.
FST Network All Rights Reserved
Karim Ajouaou Saidi 13th July 2018
CSCE 190 Computing in the Modern World Blockchain: the Basics
Blockchain for Supply Chain Bhaskar Krishnamachari
— The Blockchain Innovation Hub
Blockchain Technology: A New Approach to Provenance
Every 80 Secs – someone dies from this curable disease
NAESB Fact Sheet What’s the problem driving NAESB towards use of Blockchain? REC trade/settlement accounting processes are cumbersome, involving many.
Payments modernization
Moni Finex ပထမဦးစွာ Block ကို Chain & Crypto ငွေကြေးအခြေပြု
Block Chain Technology in Agriculture
Blockchain.
Not about digital currencies
Blockchain and Earth Observation
Cryptocurrency and Blockchain Technology
Presentation transcript:

A Blockchain-based Distributed Access Control for IoT Erez Waisbard Joint work with Roberto Di Pietro, Xavier Salleras and Matteo Signorini SACMAT 2018

PKI is not suited for IoT Security Model The IoT model No central Trusted Authority Need Mutual authentication Multiple device vendors Multiple service providers Multiple Protocols Low power unprotected devices (no crypto processing, no secure storage, no patches) PKI is not suited for IoT

Trust in IoT Building reputation using Blockchain

Motivating use case

Trust in IoT Requirements Without requiring explicit bilateral agreements Without a central root of trust Support flexible business models i.e. not simply pre-paid

Bridging Island of Trust

Offering services Publishing the Terms of Use

Distributed Reputation System The service provider makes the decision

Bitcoin & Blockchain [October 2008]

A Secure Distributed Ledger Blockchain A Secure Distributed Ledger Blockchain transaction Sender Receiver Message Block

Trust between edge devices Backends utilizes Blockchain information

Obligation Chain

Bridging Trust