Skip to main content
Top

2021 | OriginalPaper | Chapter

13. Sichere, verifizierbare Objektidentitäten als Wegbereiter für Wertschöpfung in Verteilten Netzwerken

Authors : Kai Hendrik Wöhnert, Sven-Jannik Wöhnert, Volker Skwarek

Published in: Monetarisierung von technischen Daten

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Zusammenfassung

Mit der Verbreitung von Internet-of-Things (IoT) Netzwerken wächst ebenso der Bedarf an Mechanismen, um den Sicherheitsanforderungen zu genügen. Eine Herausforderung, der sich in diesem Beitrag angenommen wird, ist das Verwalten des Zugriffs von IoT Geräten auf Daten. Es wird eine Lösung aufgezeigt, in der in einem Zusammenspiel aus Cloud, Fog und Dust die sich verändernden Identitäten von IoT Geräten feststellt und die Daten des Systems vor unberechtigten Zugriffen geschützt werden. Dieses Identitätsmanagement kann Grundlage für verschiedene Anwendungsfälle sein. Anhand von den zwei Fallbeispielen „verifizierter Ersatzteile“ und „dynamische Zonen zur Einfahrtbeschränkung von Fahrzeugen“ wird gezeigt, dass Objektidentitäten Grundlage für Monetarisierung sein können.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Byers CC (2017) Hrs: architectural imperatives for fog computing: use cases, requirements, and architectural techniques for fog-enabled IoT networks. IEEE Commun Mag 55(8):14–20CrossRef Byers CC (2017) Hrs: architectural imperatives for fog computing: use cases, requirements, and architectural techniques for fog-enabled IoT networks. IEEE Commun Mag 55(8):14–20CrossRef
3.
go back to reference Fernández-Caramés TM, Fraga-Lamas P (2018) A review on the use of blockchain for the internet of things. IEEE Access 6:32979–33001CrossRef Fernández-Caramés TM, Fraga-Lamas P (2018) A review on the use of blockchain for the internet of things. IEEE Access 6:32979–33001CrossRef
4.
go back to reference ISO 19731 (2017) Digital analytics and web analyses for purposes of market, opinion and social research – vocabulary and service requirements ISO 19731 (2017) Digital analytics and web analyses for purposes of market, opinion and social research – vocabulary and service requirements
6.
go back to reference Samie F, Tsoutsouras V, Bauer L, Xydis S, Soudris D, Henkel J (2016) Computation offloading and resource allocation for low-power IoT edge devices. In: 2016 IEEE 3rd world forum on internet of things (WF-IoT), Reston, VA, USA, 12/12/2016–14/12/2016. IEEE, S 7–12 Samie F, Tsoutsouras V, Bauer L, Xydis S, Soudris D, Henkel J (2016) Computation offloading and resource allocation for low-power IoT edge devices. In: 2016 IEEE 3rd world forum on internet of things (WF-IoT), Reston, VA, USA, 12/12/2016–14/12/2016. IEEE, S 7–12
8.
go back to reference Stallings W, Brown L, Bauer MD, Bhattacharjee AK (2012) Computer security: principles and practice. Pearson Education, Upper Saddle River Stallings W, Brown L, Bauer MD, Bhattacharjee AK (2012) Computer security: principles and practice. Pearson Education, Upper Saddle River
9.
go back to reference ISO 7498-2 (1989) Information processing systems – open systems interconnection – basic reference model ISO 7498-2 (1989) Information processing systems – open systems interconnection – basic reference model
10.
go back to reference ISO/TS 17573-2 (2020) Electronic fee collection – system architecture for vehicle related tolling – part 2: vocabulary ISO/TS 17573-2 (2020) Electronic fee collection – system architecture for vehicle related tolling – part 2: vocabulary
11.
go back to reference ISO/IEC 27000 (2014) Information technology – security techniques – information security management systems ISO/IEC 27000 (2014) Information technology – security techniques – information security management systems
16.
go back to reference Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Schnitzer A, Sandlin K, Miller R, Scarfone K (2014) Guide to attribute based access control (ABAC) definition and considerations Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Schnitzer A, Sandlin K, Miller R, Scarfone K (2014) Guide to attribute based access control (ABAC) definition and considerations
19.
go back to reference Blum M, Feldman P, Micali S (1988) Non-interactive zero-knowledge and its applications. In: Simon J (Hrsg) Proceedings of the twentieth annual ACM symposium on theory of computing – STOC’88, Chicago, Illinois, United States, 02/05/1988–04/05/1988. ACM Press, New York, S 103–112 Blum M, Feldman P, Micali S (1988) Non-interactive zero-knowledge and its applications. In: Simon J (Hrsg) Proceedings of the twentieth annual ACM symposium on theory of computing – STOC’88, Chicago, Illinois, United States, 02/05/1988–04/05/1988. ACM Press, New York, S 103–112
20.
go back to reference Schnorr CP (1990) Efficient identification and signatures for smart cards. In: Brassard G (Hrsg) Advances in cryptology – CRYPTO’89 proceedings, Bd 435. Springer, New York, S 239–252 (Lecture Notes in Computer Science) Schnorr CP (1990) Efficient identification and signatures for smart cards. In: Brassard G (Hrsg) Advances in cryptology – CRYPTO’89 proceedings, Bd 435. Springer, New York, S 239–252 (Lecture Notes in Computer Science)
21.
go back to reference Fiat A, Shamir A (2006) How to prove yourself: practical solutions to identification and signature problems. In: Andrew M. Odlyzko (Hrsg) Advances in cryptology — CRYPTO’86, Bd 263. Springer, Berlin, S 186–194 (Lecture Notes in Computer Science) Fiat A, Shamir A (2006) How to prove yourself: practical solutions to identification and signature problems. In: Andrew M. Odlyzko (Hrsg) Advances in cryptology — CRYPTO’86, Bd 263. Springer, Berlin, S 186–194 (Lecture Notes in Computer Science)
22.
go back to reference Bellare M, Goldwasser S (1990) New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs. In: Brassard G (Hrsg) Advances in cryptology — CRYPTO’89 proceedings, Bd 435. Springer, New York, S 194–211 (Lecture Notes in Computer Science) Bellare M, Goldwasser S (1990) New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs. In: Brassard G (Hrsg) Advances in cryptology — CRYPTO’89 proceedings, Bd 435. Springer, New York, S 194–211 (Lecture Notes in Computer Science)
23.
go back to reference Bitansky N, Canetti R, Chiesa A, Tromer E (2012) From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Goldwasser S (Hrsg) Proceedings of the 3rd innovations in theoretical computer science conference on – ITCS'12, Cambridge, Massachusetts, 08/01/2012–10/01/2012. ACM Press, New York, S 326–349 Bitansky N, Canetti R, Chiesa A, Tromer E (2012) From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Goldwasser S (Hrsg) Proceedings of the 3rd innovations in theoretical computer science conference on – ITCS'12, Cambridge, Massachusetts, 08/01/2012–10/01/2012. ACM Press, New York, S 326–349
24.
go back to reference Biryukov A, Feher D (2019) Privacy and linkability of mining in Zcash. In: 2019 IEEE conference on communications and network security (CNS), Washington DC, DC, USA, 10/06/2019–12/06/2019. IEEE, S 118–123 Biryukov A, Feher D (2019) Privacy and linkability of mining in Zcash. In: 2019 IEEE conference on communications and network security (CNS), Washington DC, DC, USA, 10/06/2019–12/06/2019. IEEE, S 118–123
25.
go back to reference Haupert J (2012) Towards a digital object memory architecture. In: 2012 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops), Lugano, Switzerland, 19/03/2012–23/03/2012. IEEE, S 568–569 Haupert J (2012) Towards a digital object memory architecture. In: 2012 IEEE international conference on pervasive computing and communications workshops (PerCom Workshops), Lugano, Switzerland, 19/03/2012–23/03/2012. IEEE, S 568–569
26.
go back to reference Gorecky D, Weyer S, Quint F, Köster M (2016) Definition einer Systemarchitektur für Industrie 4.0-Produktionsanlagen Gorecky D, Weyer S, Quint F, Köster M (2016) Definition einer Systemarchitektur für Industrie 4.0-Produktionsanlagen
27.
go back to reference He X, Alqahtani S, Gamble R, Papa M (2019) Securing over-the-air IoT firmware updates using blockchain. In: Proceedings of the international conference on omni-layer intelligent systems (COINS’19), Crete Greece, 05/05/2019–07/05/2019. ACM, New York, S 164–171 He X, Alqahtani S, Gamble R, Papa M (2019) Securing over-the-air IoT firmware updates using blockchain. In: Proceedings of the international conference on omni-layer intelligent systems (COINS’19), Crete Greece, 05/05/2019–07/05/2019. ACM, New York, S 164–171
28.
go back to reference Bornholdt L, Reher J, Skwarek V (2019) Proof-of-location: a method for securing sensor-data-communication in a Byzantine fault tolerant way Bornholdt L, Reher J, Skwarek V (2019) Proof-of-location: a method for securing sensor-data-communication in a Byzantine fault tolerant way
29.
go back to reference Daemen J, Reijndael RV (2001) The advanced encryption standard. Dr. Dobb’s J Softw Tools Prof Progr 26(3):137–139 Daemen J, Reijndael RV (2001) The advanced encryption standard. Dr. Dobb’s J Softw Tools Prof Progr 26(3):137–139
31.
go back to reference Brecht M, Nowey T (2013) A closer look at information security costs. In: Böhme R (Hrsg) The economics of information security and privacy. Springer, Berlin, S 3–24 Brecht M, Nowey T (2013) A closer look at information security costs. In: Böhme R (Hrsg) The economics of information security and privacy. Springer, Berlin, S 3–24
Metadata
Title
Sichere, verifizierbare Objektidentitäten als Wegbereiter für Wertschöpfung in Verteilten Netzwerken
Authors
Kai Hendrik Wöhnert
Sven-Jannik Wöhnert
Volker Skwarek
Copyright Year
2021
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-62915-4_13

Premium Partner