Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: HMD Praxis der Wirtschaftsinformatik 2/2021

08.07.2020 | Spektrum

IoT Security Best Practices

Vorstellung eines Sicherheits- und Authentifizierungskonzepts bei der Realisierung von (Industrial) Internet of Things (IIoT)-Anwendungen – Eine Fallstudie zur Clientseitigen-Authentifizierung im IoT

verfasst von: Marco Barenkamp

Erschienen in: HMD Praxis der Wirtschaftsinformatik | Ausgabe 2/2021

Einloggen, um Zugang zu erhalten
share
TEILEN

Zusammenfassung

Der Artikel gibt einen Überblick über Best-Practice-Standards zur Authentifizierung von IoT (Internet of Things) Zugängen. Es wird aufgezeigt, dass clientseitige Authentifizierung gegenüber einer herkömmlichen Authentifizierung und Blockchain-basierten Ansätzen das höchste Potential für sichere Prozessautomatisierung bei hoher Interaktionsfrequenz bietet.
Ein neuartiges Konzept des clientseitigen automatisierten Zugangsmanagements auf Basis von TLS (transport layer security), welches sich im Agriculture Segment seit über einem Jahr bewährt hat, wird vorgestellt. Gegenüber derzeitig eingesetzten Authentifizierungsverfahren bietet es den Vorteil höherer Sicherheit bei gleichzeitig automatisierter Anmeldung jeglicher Endgeräte auf dem IoT-Server. Aufgrund dieser Potentiale eignet sich der dargestellte Authentifizierungsstandard zukünftig als allgemeines branchenübergreifendes Zugangssystem für IoT-Anwendungen.
Literatur
Zurück zum Zitat Amann B, Vallentin M, Hall S, Sommer R (2012) Revisiting SSL: a large-scale study of the internet’s most trusted protocol. Tech. rep., TR-12-015, ICSI Dec. 2012 Amann B, Vallentin M, Hall S, Sommer R (2012) Revisiting SSL: a large-scale study of the internet’s most trusted protocol. Tech. rep., TR-12-015, ICSI Dec. 2012
Zurück zum Zitat Angelova N, Kiryakova G, Yordanova L (2017) The great impact of internet of things on business. Trakia J Sci 15(1):406–412 Angelova N, Kiryakova G, Yordanova L (2017) The great impact of internet of things on business. Trakia J Sci 15(1):406–412
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805 MATH Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805 MATH
Zurück zum Zitat Badra M, Hajjeh I (2006) Key-exchange authentication using shared secrets. Computer 39(3):58–66 Badra M, Hajjeh I (2006) Key-exchange authentication using shared secrets. Computer 39(3):58–66
Zurück zum Zitat Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949 Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP. Secur Commun Netw 7(6):945–949
Zurück zum Zitat Biddle R, Van Oorschot PC, Patrick AS, Sobey J, Whalen T (2009) Browser interfaces and extended validation SSL certificates: an empirical study. In: Proceedings of the 2009 ACM workshop on Cloud computing security, S 19–30 Biddle R, Van Oorschot PC, Patrick AS, Sobey J, Whalen T (2009) Browser interfaces and extended validation SSL certificates: an empirical study. In: Proceedings of the 2009 ACM workshop on Cloud computing security, S 19–30
Zurück zum Zitat Brewster C, Roussaki I, Kalatzis N, Doolin K, Ellis K (2017) IoT in agriculture: designing a Europe-wide large-scale pilot. IEEE Commun Mag 55(9):26–33 Brewster C, Roussaki I, Kalatzis N, Doolin K, Ellis K (2017) IoT in agriculture: designing a Europe-wide large-scale pilot. IEEE Commun Mag 55(9):26–33
Zurück zum Zitat Camps-Mur D, Garcia-Villegas E, Lopez-Aguilera E, Loureiro P, Lambert P, Raissinia A (2015) Enabling always on service discovery: Wifi neighbor awareness networking. Ieee Wirel Commun 22(2):118–125 Camps-Mur D, Garcia-Villegas E, Lopez-Aguilera E, Loureiro P, Lambert P, Raissinia A (2015) Enabling always on service discovery: Wifi neighbor awareness networking. Ieee Wirel Commun 22(2):118–125
Zurück zum Zitat Chadwick DW (2002) Internet X. 509 public key infrastructure operational protocols. LDAPv3 Chadwick DW (2002) Internet X. 509 public key infrastructure operational protocols. LDAPv3
Zurück zum Zitat Chung T, Liu Y, Choffnes D, Levin D, Maggs BM, Mislove A, Wilson C (2016) Measuring and applying invalid SSL certificates: the silent majority. In: Proceedings of the 2016 Internet Measurement Conference, S 527–541 Chung T, Liu Y, Choffnes D, Levin D, Maggs BM, Mislove A, Wilson C (2016) Measuring and applying invalid SSL certificates: the silent majority. In: Proceedings of the 2016 Internet Measurement Conference, S 527–541
Zurück zum Zitat Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk WT (2008) Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC, Bd. 5280, S 1–151 Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk WT (2008) Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC, Bd. 5280, S 1–151
Zurück zum Zitat Erguler I (2015) A potential weakness in RFID-based Internet-of-things systems. Pervasive Mob Comput 20:115–126 Erguler I (2015) A potential weakness in RFID-based Internet-of-things systems. Pervasive Mob Comput 20:115–126
Zurück zum Zitat Farrell S, Kahan J (2005) Using the XML key management specification (and breaking x. 509 rules as you go). In: IFIP International Conference on Communications and Multimedia Security. Springer, Berlin, Heidelberg, S 348–357 Farrell S, Kahan J (2005) Using the XML key management specification (and breaking x. 509 rules as you go). In: IFIP International Conference on Communications and Multimedia Security. Springer, Berlin, Heidelberg, S 348–357
Zurück zum Zitat Ferrández-Pastor FJ, García-Chamizo JM, Nieto-Hidalgo M, Mora-Pascual J, Mora-Martínez J (2016) Developing ubiquitous sensor network platform using internet of things: application in precision agriculture. Sensors 16(7):1141 Ferrández-Pastor FJ, García-Chamizo JM, Nieto-Hidalgo M, Mora-Pascual J, Mora-Martínez J (2016) Developing ubiquitous sensor network platform using internet of things: application in precision agriculture. Sensors 16(7):1141
Zurück zum Zitat Gansemer S, Sell J, Schulz S, Horster B, Horster-Möller T, Rusch C, Eren E et al (2014) Machine-to-machine communication for process optimization in agriculture. In: 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems. Offenburg, 2014. IEEE, S 48–54. https://​doi.​org/​10.​1109/​IDAACS-SWS.​2014.​6954622 Gansemer S, Sell J, Schulz S, Horster B, Horster-Möller T, Rusch C, Eren E et al (2014) Machine-to-machine communication for process optimization in agriculture. In: 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems. Offenburg, 2014. IEEE, S 48–54. https://​doi.​org/​10.​1109/​IDAACS-SWS.​2014.​6954622
Zurück zum Zitat Georgiev M, Iyengar S, Jana S, Anubhai R, Boneh D, Shmatikov V (2012) The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM conference on Computer and communications security, S 38–49 Georgiev M, Iyengar S, Jana S, Anubhai R, Boneh D, Shmatikov V (2012) The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM conference on Computer and communications security, S 38–49
Zurück zum Zitat Gupta H (2019) Onboarding and software update architecture for IoT devices. Masterthesis Gupta H (2019) Onboarding and software update architecture for IoT devices. Masterthesis
Zurück zum Zitat Koutanov E (2020) Effective Kafka. A hand-on guide to building robust and scalable event-driven applications with code examples in Java Koutanov E (2020) Effective Kafka. A hand-on guide to building robust and scalable event-driven applications with code examples in Java
Zurück zum Zitat Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In: Proceedings of the 2014 IEEE International Symposium on Next-Generation Electronics Kwei-Shan, Taiwan, 7–10 May 2014, S 1–2 Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In: Proceedings of the 2014 IEEE International Symposium on Next-Generation Electronics Kwei-Shan, Taiwan, 7–10 May 2014, S 1–2
Zurück zum Zitat Leng K, Bi Y, Jing L, Fu HC, Van Nieuwenhuyse I (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Future Gener Comput Syst 86:641–649 Leng K, Bi Y, Jing L, Fu HC, Van Nieuwenhuyse I (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Future Gener Comput Syst 86:641–649
Zurück zum Zitat Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259 Li S, Da Xu L, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259
Zurück zum Zitat Lu RJ, Liu ZG, Zheng XH (2006) United Authentication Platform Based on HTTPS Tunnel Technology. Appl Res Comp 2006(12):168–170 Lu RJ, Liu ZG, Zheng XH (2006) United Authentication Platform Based on HTTPS Tunnel Technology. Appl Res Comp 2006(12):168–170
Zurück zum Zitat Mayer CP (2009) Security and privacy challenges in the internet of things. In: Electronic Communications of the EASST, Bd. 17 Mayer CP (2009) Security and privacy challenges in the internet of things. In: Electronic Communications of the EASST, Bd. 17
Zurück zum Zitat Mendez DM, Papapanagiotou I, Yang B (2017) Internet of things: Survey on security and privacy. arXiv preprint arXiv:1707.01879 Mendez DM, Papapanagiotou I, Yang B (2017) Internet of things: Survey on security and privacy. arXiv preprint arXiv:1707.01879
Zurück zum Zitat Miettinen M, van Oorschot PC, Sadeghi AR (2018) Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. arXiv preprint arXiv:1808.03071 Miettinen M, van Oorschot PC, Sadeghi AR (2018) Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. arXiv preprint arXiv:1808.03071
Zurück zum Zitat Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Procedia Comput Sci 93:931–939 Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Procedia Comput Sci 93:931–939
Zurück zum Zitat Nash E, Korduan P, Bill R (2009) Applications of open geospatial web services in precision agriculture: a review. Precis Agric 10(6):546 Nash E, Korduan P, Bill R (2009) Applications of open geospatial web services in precision agriculture: a review. Precis Agric 10(6):546
Zurück zum Zitat Ojha T, Misra S, Raghuwanshi NS (2015) Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput Electron Agric 118:66–84 Ojha T, Misra S, Raghuwanshi NS (2015) Wireless sensor networks for agriculture: the state-of-the-art in practice and future challenges. Comput Electron Agric 118:66–84
Zurück zum Zitat Oksanen T, Linkolehto R, Seilonen I (2016) Adapting an industrial automation protocol to remote monitoring of mobile agricultural machinery: a combine harvester with IoT. IFAC-PapersOnLine 49(16):127–131 Oksanen T, Linkolehto R, Seilonen I (2016) Adapting an industrial automation protocol to remote monitoring of mobile agricultural machinery: a combine harvester with IoT. IFAC-PapersOnLine 49(16):127–131
Zurück zum Zitat Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, S 523–533 Ouaddah A, Elkalam AA, Ouahman AA (2017) Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA cooperation advances in information and communication technologies. Springer, Cham, S 523–533
Zurück zum Zitat Patil VC, Al-Gaadi KA, Biradar DP, Rangaswamy M (2012) Internet of things (Iot) and cloud computing for agriculture: an overview. In: Proceedings of agro-informatics and precision agriculture AIPA 2012, India, S 292–296 Patil VC, Al-Gaadi KA, Biradar DP, Rangaswamy M (2012) Internet of things (Iot) and cloud computing for agriculture: an overview. In: Proceedings of agro-informatics and precision agriculture AIPA 2012, India, S 292–296
Zurück zum Zitat Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019a) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: 9th International Conference on Model and Data Engineering, MEDI 2019, Toulouse, France, 2019. Lecture notes in computer science, Bd 11815. Springer, S 172 Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019a) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: 9th International Conference on Model and Data Engineering, MEDI 2019, Toulouse, France, 2019. Lecture notes in computer science, Bd 11815. Springer, S 172
Zurück zum Zitat Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019b) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: International Conference on Model and Data Engineering. Springer, Cham, S 172–183 Pešić S, Radovanović M, Ivanović M, Tošić M, Iković O, Bošković D (2019b) Hyperledger fabric blockchain as a service for the IoT: proof of concept. In: International Conference on Model and Data Engineering. Springer, Cham, S 172–183
Zurück zum Zitat Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE Wireless Communications and Networking Conference WCNC, Istanbul, 2014, IEEE, S 2728–2733 Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: 2014 IEEE Wireless Communications and Networking Conference WCNC, Istanbul, 2014, IEEE, S 2728–2733
Zurück zum Zitat Potamitis I, Eliopoulos P, Rigakis I (2017) Automated remote insect surveillance at a global scale and the internet of things. Robotics 6(3):19 Potamitis I, Eliopoulos P, Rigakis I (2017) Automated remote insect surveillance at a global scale and the internet of things. Robotics 6(3):19
Zurück zum Zitat Saloni S, Hegde A (2016) WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: enabling new proximity based services. In: 2016 International Conference on Internet of Things and Applications IOTA, Pune, India, 2016, IEEE, S 137–142 Saloni S, Hegde A (2016) WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: enabling new proximity based services. In: 2016 International Conference on Internet of Things and Applications IOTA, Pune, India, 2016, IEEE, S 137–142
Zurück zum Zitat Schmeh K (2016) Kryptografie: Verfahren, Protokolle, Infrastrukturen. dpunkt.verlag, Heidelberg MATH Schmeh K (2016) Kryptografie: Verfahren, Protokolle, Infrastrukturen. dpunkt.verlag, Heidelberg MATH
Zurück zum Zitat Shacham H, Boneh D (2001) Improving SSL handshake performance via batching. In: Cryptographers’ track at the RSA Conference. Springer, Berlin, Heidelberg, S 28–43 Shacham H, Boneh D (2001) Improving SSL handshake performance via batching. In: Cryptographers’ track at the RSA Conference. Springer, Berlin, Heidelberg, S 28–43
Zurück zum Zitat Shen J, Chang S, Shen J, Liu Q, Sun X (2018) A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener Comput Syst 78:956–963 Shen J, Chang S, Shen J, Liu Q, Sun X (2018) A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener Comput Syst 78:956–963
Zurück zum Zitat Shenoy J, Pingle Y (2016) IOT in agriculture. In: 2016 3rd International Conference on Computing for Sustainable Global Development INDIACom, New Delhi, 2016. IEEE, S 1456–1458 Shenoy J, Pingle Y (2016) IOT in agriculture. In: 2016 3rd International Conference on Computing for Sustainable Global Development INDIACom, New Delhi, 2016. IEEE, S 1456–1458
Zurück zum Zitat Shi X, An X, Zhao Q, Liu H, Xia L, Sun X, Guo Y (2019) State-of-the-art internet of things in protected agriculture. Sensors 19(8):1833 Shi X, An X, Zhao Q, Liu H, Xia L, Sun X, Guo Y (2019) State-of-the-art internet of things in protected agriculture. Sensors 19(8):1833
Zurück zum Zitat Shin S, Kobara K (2016) A security framework for MQTT. In: 2016 IEEE Conference on Communications and Network Security CNS, S 432–436 Shin S, Kobara K (2016) A security framework for MQTT. In: 2016 IEEE Conference on Communications and Network Security CNS, S 432–436
Zurück zum Zitat Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. Comput Netw 76:146–164 Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. Comput Netw 76:146–164
Zurück zum Zitat Sodiya AS, Folorunso O, Komolafe PB, Ogunderu OP (2011) Preventing authentication systems from keylogging attack. J Inf Priv Secur 7(2):3–27 Sodiya AS, Folorunso O, Komolafe PB, Ogunderu OP (2011) Preventing authentication systems from keylogging attack. J Inf Priv Secur 7(2):3–27
Zurück zum Zitat Soltani R, Nguyen UT, An A (2018) A new approach to client onboarding using self-sovereign identity and distributed ledger. Paper presented at the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 2018. IEEE, S 1129–1136. https://​doi.​org/​10.​1109/​Cybermatics_​2018.​2018.​00205 Soltani R, Nguyen UT, An A (2018) A new approach to client onboarding using self-sovereign identity and distributed ledger. Paper presented at the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 2018. IEEE, S 1129–1136. https://​doi.​org/​10.​1109/​Cybermatics_​2018.​2018.​00205
Zurück zum Zitat Sonare S, Mishra A, Verma A (2012) An authentication mechanism based on Client-Server architecture for accessing Cloud Computing. Int J Emerging Technol Adv Eng 2(7):2250–2459 Sonare S, Mishra A, Verma A (2012) An authentication mechanism based on Client-Server architecture for accessing Cloud Computing. Int J Emerging Technol Adv Eng 2(7):2250–2459
Zurück zum Zitat Stočes M, Vaněk J, Masner J, Pavlík J (2016) Internet of things (iot) in agriculture-selected aspects. Agris On-line Pap Econ Inform 8(665-2016-45107):83–88 Stočes M, Vaněk J, Masner J, Pavlík J (2016) Internet of things (iot) in agriculture-selected aspects. Agris On-line Pap Econ Inform 8(665-2016-45107):83–88
Zurück zum Zitat Sukhwani H, Martínez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th Symposium on Reliable Distributed Systems SRDS. Hong Kong. IEEE, S 253–255 Sukhwani H, Martínez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th Symposium on Reliable Distributed Systems SRDS. Hong Kong. IEEE, S 253–255
Zurück zum Zitat Tasca P, Tessone CJ (2017) Taxonomy of blockchain technologies. Principles of identification and classification. arXiv preprint arXiv:1708.04872 Tasca P, Tessone CJ (2017) Taxonomy of blockchain technologies. Principles of identification and classification. arXiv preprint arXiv:1708.04872
Zurück zum Zitat Wagner D, Schneier B (1996) Analysis of the SSL 3.0 protocol. In: The Second USENIX Workshop on Electronic Commerce Proceedings, Bd. 1, No. 1, S 29–40 Wagner D, Schneier B (1996) Analysis of the SSL 3.0 protocol. In: The Second USENIX Workshop on Electronic Commerce Proceedings, Bd. 1, No. 1, S 29–40
Zurück zum Zitat Weber RH (2009) Internet of things—need for a new legal environment? Comput Law Secur Rev 25(6):522–527 Weber RH (2009) Internet of things—need for a new legal environment? Comput Law Secur Rev 25(6):522–527
Zurück zum Zitat Weber RH (2010) Internet of things—new security and privacy challenges. Comput Law Secur Rev 26(1):23–30 Weber RH (2010) Internet of things—new security and privacy challenges. Comput Law Secur Rev 26(1):23–30
Zurück zum Zitat Weißbach M, Taing N, Wutzler M, Springer T, Schill A, Clarke S (2016) Decentralized coordination of dynamic software updates in the Internet of Things. In: 2016 IEEE 3rdWorld Forum on Internet of Things WF-IoT, S 171–176 Weißbach M, Taing N, Wutzler M, Springer T, Schill A, Clarke S (2016) Decentralized coordination of dynamic software updates in the Internet of Things. In: 2016 IEEE 3rdWorld Forum on Internet of Things WF-IoT, S 171–176
Zurück zum Zitat Woodbury C, Botz P (2004) Experts’ guide to OS/400 & I5/OS security. System iNetwork, 29th Street Press Woodbury C, Botz P (2004) Experts’ guide to OS/400 & I5/OS security. System iNetwork, 29th Street Press
Zurück zum Zitat Yewale AJ (2018) Study of Blockchain-as-a-Service Systems with a Case Study of Hyperledger Fabric Implementation on Kubernetes Yewale AJ (2018) Study of Blockchain-as-a-Service Systems with a Case Study of Hyperledger Fabric Implementation on Kubernetes
Zurück zum Zitat Zhao K, Ge L (2013) A survey on the internet of things security. Paper presented at the 2013 Ninth International Conference on Computational Intelligence and Security, S. 663–667 Zhao K, Ge L (2013) A survey on the internet of things security. Paper presented at the 2013 Ninth International Conference on Computational Intelligence and Security, S. 663–667
Zurück zum Zitat Zyskind G, Nathan O, Pentland A (2015) Decentralizing Privacy: Using Blockchain to Protect Personal Data. Paper presented at the 2015 IEEE Security and Privacy Workshops, S 180–184 Zyskind G, Nathan O, Pentland A (2015) Decentralizing Privacy: Using Blockchain to Protect Personal Data. Paper presented at the 2015 IEEE Security and Privacy Workshops, S 180–184
Metadaten
Titel
IoT Security Best Practices
Vorstellung eines Sicherheits- und Authentifizierungskonzepts bei der Realisierung von (Industrial) Internet of Things (IIoT)-Anwendungen – Eine Fallstudie zur Clientseitigen-Authentifizierung im IoT
verfasst von
Marco Barenkamp
Publikationsdatum
08.07.2020
Verlag
Springer Fachmedien Wiesbaden
Erschienen in
HMD Praxis der Wirtschaftsinformatik / Ausgabe 2/2021
Print ISSN: 1436-3011
Elektronische ISSN: 2198-2775
DOI
https://doi.org/10.1365/s40702-020-00637-4

Weitere Artikel der Ausgabe 2/2021

HMD Praxis der Wirtschaftsinformatik 2/2021 Zur Ausgabe

Premium Partner