BB23.O Security Core - Identification, Authentication and Communication

From its-wiki.no

Revision as of 18:11, 11 December 2017 by Josef.Noll (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Title SCOTT Security Core - Identification, authentication and secure communication
Page Title BB23.O Security Core - Identification, Authentication and Communication
Technology Line Security & Safety
Lead partner Nokia
Leader Silke Holtmanns
Contributors Nokia, CISC, EAB, F-SECURE, LCM, PRE, UiO, SBA, VTT, VIF, VEMCO
Related to Use Cases SCOTT:WP7, SCOTT:WP9, SCOTT:WP11, SCOTT:WP12, SCOTT:WP13, SCOTT:WP14, SCOTT:WP15, SCOTT:WP21
Description Access to data needs to be protected against malicious access. The access might happen during transport or storage between sensors and processing entity, which might be in the cloud. Therefore any communication need to be secured against eavesdropping, modification and impersonation. The building block Security Core will provide a description of available suitable “security tools” that can be utilized for secure authorized access and secure communication. Potential drawbacks, limitations and security issues of the particular approaches are part of the document
Main output Document that describes suitable security solutions for trustable networks and communications.
BB category Other
Baseline There exist many communication security standards, but for sensor networks it is often unclear, which of those standards would really improve the security of their system. This document provides a guide for those.
Current TRL 4-5 Protocols, libraries and algorithms exist, but very commonly not used due to lack of „expertise“ what fits to which usage scenario
Target TRL 6-7 Ease the identification of the "right" security approach for non security experts for the IoT device. Still some will not deploy security at all.