IoT security based on the DPK platform

Size: px
Start display at page:

Download "IoT security based on the DPK platform"

Transcription

1 Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury

2 ABSTRACT Public key distribution remains one of the main security weaknesses in many applications and especially in IoT. DPK (Distributed Public Keystore) platform provides a decentralized keystore that holds the public keys for all DPK s users. The platform enables the user with a DPK client module to interact with the Ethereum Blockchain to store and retrieve the cryptographic keys. The DPK platform includes the DPK module on the client side, the PKM module on the server side, and the Smart contracts software in the Ethereum Blockchain network. This client module is installed on a variety of software and hardware entities (Mobile App, web browser, server, IoT devices etc ). The light DPK module contains an Ethereum light client LES which mainly applicable for IoT devices. Having a decentralized public keystore that contains the cryptographic keys of all devices enables the secure distribution of the session keys that will be used as pre-shared keys for PSK-based security protocols (TLS-PSK, DTLS-PSK )

3 1. INTRODUCTION Security and privacy are critical issues facing the development of the Internet of Things. Existing security solutions are not applicable to IoT: PKI/CA for instance, requires a large infrastructure to manage certificates and requires each IoT device to have a certificate for client authentication. Distribution of certificates for many devices is impractical and nearly impossible. On the other hand, other solutions like hardcoding the credentials on the IoT devices, imposes the threat of reverse engineering. The DPK (Distributed Public Keystore) platform allows the IoT authenticated device to store and distribute its public key by using the Ethereum Blockchain technology. The Blockchain acts as a decentralized public key infrastructure and a decentralized certificate authority that ensures the secure distribution of public keys and other cryptographic parameters. As a result, the system overcomes the issue of the Public keys distribution which remains till today one of the main security concerns in many applications and especially in IoT. DPK is developed as a generic platform that can be called by different applications to access transparently the Ethereum Blockchain network. Some of these applications include: IoT security (authentication, confidentiality and integrity in many scenarios and configurations), secure peer to peer communications, and others. The main contribution of this platform is the elimination of the public key infrastructure (PKI) and the Certificate Authority (CA), and the implementation of a generic handshake protocol for the PSK (Preshared Key) based security protocol like TLS-PSK, DTLS-PSK, SRTP, etc This out band generic protocol is responsible for the distribution of the PSK key between two entities. The client module could be part of mobile application software or plug-in software in a server or in web browser In the next section, we provide a background on the Ethereum Blockchain, and elaborate the technical overview of the proposed solution. 2. TECHNICAL OVERVIEW 2.1- Ethereum Blockchain and smart contracts The distributed ledger technologies (DLT), the new Technology of trust A Blockchain is a distributed database; copies are stored in many computers simultaneously. There is no single controlling computer. The validity of a particular version of a Blockchain is established by consensus amongst several nodes that form a central one. [Ethereum White Paper] A Blockchain is more than just a decentralized digital ledger. It can contain Data and transaction records.

4 The use of the Blockchain technology deals with confirming the integrity of data associated with the transaction. That feature of Blockchain is a key for secure the integrity of the next proliferation of networked devices. [ref Ericsson industrialized Blockchain and data integrity]. Ethereum Ethereum is a Blockchain architecture with an associated state database, capable of storing programs and their state. These programs are commonly referred to as Smart Contracts. A smart contract can be deployed by any Ethereum user and it has a function-based interface. Once deployed the smart contract can be referenced by its address, which is a cryptographic identifier. A user can call a smart contract function by sending a transaction with this address as the destination, and with the data payload of the transaction containing the function signature and input parameters. Calling a function causes the miners of the network to execute the program in a trust-minimized way and update its state. A smart contract can hold and send the native value token Ether, and can furthermore call functions of other smart contracts. For further reading on Ethereum and Smart contracts, see the Ethereum White paper: LES (The Light Ethereum Subprotocol) Blockchain technology by design consumes a considerable amount of memory to store the historical transactions. Obviously, it is not applicable to use a normal Full node on an IoT device due to the constraints imposed by the device. Fortunately, an alternative to the Ethereum full node is the Light node. The light client has been designed to function more or less the same as a full client. It is able to run with as low as 10Mb of storage space retrieval thanks to the garbage collection enabled (which scheduled to be implemented), the database will function more like a cache. The current Geth (Go language implementation) uses around 200Mb of memory, which can probably be further reduced. Bandwidth requirements are also lower when the client is not used heavily. Bandwidth used is usually well under 1Mb/hour when running idle, with an additional 2-3kb for an average Future improvements are undertaken in LES like reducing overall latency by remote execution and verifying complex calculations indirectly and improving the slow search speed of log histories.

5 2.2- Public or Private Ethereum Blockchain Based on the customers requirements, the Ethereum network could be private or public: Public Blockchain: a public Blockchain is a Blockchain that anyone in the world can read, send transactions and expect to see them included if they are valid, and anyone in the world can participate in the consensus process Private Blockchain: a fully private Blockchain is a Blockchain where write permissions are kept centralized to one organization. Read permissions may be public or restricted to an arbitrary extent. Advantages of private Blockchain: Transactions are cheaper, since they only need to be verified by a few nodes that can be trusted to have very high processing power, and do not need to be verified by ten thousand laptops. The validators are known, so any risk of a 51% attack arising from some miner collusion in China does not apply. Nodes can be trusted to be very well-connected, and faults can quickly be fixed by manual intervention, allowing the use of consensus algorithms which offer finality after much shorter block times. The advantages of public Blockchains Public Blockchains provide a way to protect the users of an application from the developers, establishing that there are certain things that even the developers of an application have no authority to do. Public Blockchains are open, and therefore are likely to be used by very many entities and gain some network effects DPK (Distributed Public Key Store) System Architecture The Software components of the DPK platform consist of the following: 1. DPK client module 2. PKM (Public Key Manager) at the network side 3. Smart contracts in the Ethereum Blockchain network. PKM (Public Key Manager) Function in the DPK platform located on the Network side that authenticates the IoT devices and approves the storage of the cryptographic keys. The main functions of the PKM are:

6 Figure 1 - Solution Overview a) Wallet management: The download or the installation of the user DPK client module at the user side (IoT device) automatically generates the public, private keys and creates an empty Ethereum wallet. The user does not need to own an Ethereum account or ether. The main role of the PKM is to authenticate the DPK client module in the IoT device and send the necessary Ether to the Client to be able to store the user public key in Ethereum. The PKM performs the wallet management functionality by sending Ether to the client and approve the request of the transaction to store the user public key in Ethereum. The PKM module could contains a full or a light Ethereum node to store its public key as well in Ethereum. b) Registration and configuration of the IoT devices: This function could be part of an IoT cloud platform management and in some cases in PKM. The IoT devices accessing the DPK platform should be registered and configured in the cloud platform through a web interface. The configuration consists of assigning a unique Token to the DPK client on the IoT device. This Token is crucial to identify the DPK client module installed on the device, and to ensure that the transaction fees in Ethereum have been paid. The storing transactions in Ethereum Blockchain cost ether. When the DPK module is installed, an empty Ethereum wallet address and private, public keypair are generated. The Wallet management functions in PKM transfers Ether to the DPK client after confirmation of the identity and the transaction fees payment of the IoT device through the associated Token. The payments are done in any fiat currency and the storage transactions fees are paid using the Ether Cryptocurrency. The transaction mechanism of storing the cryptographic keys by the IoT device is controlled by the PKM wallet management.

7 DPK module at the Client: This module could be downloaded or part of the firmware of an IoT device. There are two types of DPK module: Light with LES (Light Ethereum Subprotocol) which is considered a Light Node Ethereum. Full Node Ethereum, usually installed in Servers or high processing and memory devices The DPK client module includes an Ethereum light client (LES) to interwork with Blockchain. The module contacts PKM to fill in the client wallet with the necessary Ether to be able to perform the storing of the client public key in the Ethereum network. At the configuration, a Token file is deployed to each DPK client module to identify and authenticate the client. The Token is part of the information sent to the PKM wallet management which are mainly the following: Ethereum Wallet address, DPK module identity, [Token]Pr pkm, [Token]Pr pkm : Token signed with PKM Private Key The PKM sends back the needed Ether to perform storage of the client public keys in the Ethereum network. DPK smart contract software The smart contract is deployed on the Ethereum Blockchain network. It contains the following functions: 1- addclient() 2- getclient() 3- approveclient() The approval sequence steps are the following: 1- The client (IoT device) calls the function addclient in the smart contract by signing a transaction. This function adds any client to the pending list. The input parameters are: DPK client Identity: any addressable identity like domain name, public IP, URI etc.. Public Key: RSA 2048 public key Token: a string generated randomly and signed by the IoT cloud platform service 2- The DPK client module sends an approval request to the PKM containing the signed token.

8 3- The PKM calls the function approveclient in the smart contract by signing a transaction. The token is the only parameter used. 4- Only the owner of the contract (the platform provider) can approve the client: The approval process is achieved by searching for the token in the pending list, and if found, copying the first occurrence to the approved clients list. First come, first serve approach is implemented in the contract to mitigate against token duplication. The pending client is released from the pending list getclient(identity) function is used to fetch the public key of the requested identity 3. CONFIGURATION MECHANISM 3.1 DPK identity The DPK is considered as a platform to store and provide cryptographic keys (mainly Public Keys) to any applications intended to communicate securely with its recipients. The application can use any transport layer security like: TLS, DTLS, SRTP The DPK client entity should be addressed using routable addresses like IPv6 address, IPv4 public IP address, phone number, or domain name etc The DPK identity is defined during the configuration of the devices. Figure 2 - Configuration Mechanism

9 3.2 DPK client module and PKM interfaces The communication channel between DPK client module and PKM is secured using TLS- PSK. The DPK client module and PKM at the server side are considered as part of the Blockchain Ethereum network as the DPK client and PKM contains a light Ethereum client (LES) and a full node Ethereum client respectively. 3.3 The transaction public key storage flow The figure represents the mechanism flow of executing the public keys transaction storage in Ethereum using the DPK platform. It should be noted that the PKM server stores as well it public key Pu pkm in Ethereum. The Pu pkm is fetched from Ethereum by any users of the DPK platform to communicate securely with PKM. The main function of the PKM is to approve the transaction requests of the DPK client module to store their public keys in Ethereum. Storage Flow: 1. PKM server stores its public key in Ethereum Pu pkm. The PKM contains a full or light Ethereum Node. 2. Registration and configuration of the IoT device in the IoT cloud Platform Service. The configuration is executed through a web interface. The configuration is associated with the payment of the transaction fees for each IoT device and therefore for each DPK client module. A Token is generated and encrypted with PKM private key Pr pkm ([Token]Pr pkm ) and a DPK identity is assigned to the DPK client module. The Token is needed to identify and authenticate the IoT device and to ensure that the transaction fees in Ethereum have been paid. 3. The installation of DPK client module in the IoT device generates an empty Ethereum wallet address, and accepts the Token file as an input. 4. To be able to communicate securely with the PKM, the DPK client module get the Public key of the PKM and generate randomly a session key which is encrypted with Public key of PKM 5. DPK module requests from the PKM (in a secure way (TLS-PSK)), the authorization to execute the storage transaction of the DPK s module public key in Ethereum. The main data sent to PKM are: Ethereum Wallet address, DPK client module identity, [Token]Pr pkm. 6. The PKM server decrypt the token received by the Pu pkm and verify the Token authenticity associated to the IoT device. 7. If the verification is successful, PKM send Ether to the concerned IoT device 8. After filling in the Ethereum wallet, the DPK client module in the IoT device stores its public key in Ethereum Network.

10 5- Transaction approved by PKM: The DPK client module sends an approval request to the PKM in the cloud platform containing the signed token. The PKM calls the function approveclient in the smart contract by signing a transaction using the received token. 4. ENCRYPTED COMMUNICATION MECHANISM Figure 3 represents an example of secure communication between two entities or two IoT devices using the DPK platform Figure 3 - Secure Communication 1. It is assumed that both DPK client module in IoT device1 and IoT device 2 has stored their public keys PuK1 and PuK2 in Ethereum according to the mechanism described above. 2. IoT device 1 requests the public key of IoT device 2 from Ethereum. 3. The smart contract contains a list of the DPK client module identities and their corresponding Public Keys. Upon IoT device1 request, the smart contract sends back the public key corresponding to the IoT device2 (PuK2). 4. The client module in device1 starts the pre-shared handshake protocol by generating randomly a session key Ks. This session key Ks is used as a pre-shared Key (PSK) for the security protocol adopted to encrypt the communication session between the two devices (TLS-PSK, DTLS-PSK, SRTP etc ) 5. Ks is sent encrypted with the public key of the device2: { Ks } PuK2 6. Once received, the device2 decrypts the message with its private key and extracts the session key Ks.

11 4.1 DPK module API for Applications Any application in a certain device can get the destination public key by accessing the DPK client module in a well-defined API. The same API is used for remote application running for example on IoT constrained devices in capillary network (See section 5). 5. DELEGATED DPK IN CAPILLARY NETWORKS FOR CONSTRAINED DEVICES The aim in capillary networks is to establish an end to end session key between the end device (which is usually an IoT constrained device) and a server. The constrained devices can be seen as resources of the authenticated CGW. The delegated DPK method requires that the end device requests from the CGW a session key Ks to be used to encrypt the communication between the device and the recipient (Server). The DPK module in the CGW gets the public key of the server PuK2 from the Ethereum blockchain. An end-to-end session key Ks is generated by the DPK module in CGW. The Ks, and [Ks] PuK2, (the Ks encrypted with public key of the destination server) are sent to the constrained device which in turn transfers { Ks } PuK2 to the server as a Ticket. The session key Ks is shared between the two entities, this key can be used for setting up any type of secure communication such as pre-shared key based TLS (TLS-PSK) session between the end device and the server. Figure 4 - Capillary Network

12 A precondition for this method is to have a secure channel in the capillary network between the end devices and the CGW. The end device can interwork with DPK module in the CGW through the same API as the one used by the local application in the CGW 6. DPK COMBINED WITH GBA ALTERNATIVE 2 Figure 5 - GBA combined with DPK In this alternative, the GBA (Generic Bootstrapping Architecture) method is combined with the Blockchain technology to provide ultimate security for the IoT devices. The GBA architecture is used to authenticate the device based on its SIM/E-SIM by the mobile operator. Then, the DPK platform which is based on Ethereum Blockchain is used to provide integrity and confidentiality of the information. The main advantage of deploying GBA is the elimination of the complexity of PKI and certificates distributions as the client authentication is based on the existing mobile operator infrastructure. The advantage of alternative 2 compared to the alternative 1 is the elimination of the configuration of the devices in IoT cloud platform server or the PKM and the process to deploy a Token for each one. The solution in alternative2 is based on two trusted authorities: Mobile Operator and blockchain network. Furthermore, the DPK platform is a catalyst for a new business opportunity for mobile operator to deploy the GBA solution.

13 7.1 Architecture Overview The assumption that the mobile operator has introduced the GBA and deployed the GBA software components: BSF (Bootstrapping Server Function), NAF (Network Application Function) in the network and client GBA software. Generic Bootstrapping Architecture (GBA): GBA is an authentication architecture standardized by the 3GPP that enables the authentication of a client and a server based on existing mobile network operator infrastructure. The main modifications in the DPK solution compared to the Alternative1 are: 1) 2) 3) 4) The Network Application Function (NAF): element which forms the authentication function of the server side, is added in the PKM A secure communication interface between PKM and BSF node in the mobile core network. 3GPP GBA client added in the IoT device. The BT-ID (Bootstrapping Transaction Identifier) generated during the GBA authentication is used instead of the Token to identify the DPK client module installed on the device, and to ensure that the transaction fees in Ethereum have been paid. Figure 6 - GBA/DPK Architecture

14 8. BUSINESS MODEL Storing data in the Blockchain costs money (Ether) therefore, the storage of the public key requires Ether. DPK platform provides the IoT devices with Ethereum wallets filled with Ether transparently. The company running this service revenue for each device public key storage transaction. In case of GBA there is another important source of revenue for the mobile operator by providing authentication based on GBA. Moreover, this is a new sales opportunity for mobile infrastructure manufacturer like Ericsson as they can upgrade their existing mobile operators with GBA software components (BSF, NAF ). Gartner Says 8.4 Billion Connected "Things" will be in use in 2017, Up 31 Percent From If we consider this number as a reference and we consider that 1% of these devices will use the DPK service with a 1$ fee per transaction, we end up with $ It is worth noting that the number of IoT devices is increasing exponentially to reach 20 Billion according to Gartner. CONCLUSION Security and privacy are critical issues facing the development of the Internet of Things since the existing security solutions cannot be applied to IoT devices, especially constrained devices. Blockchain technology has proven to be a secure and fully decentralized immutable database. Based on this fact, DPK platform benefited from the Blockchain technology to safely store and manage end devices cryptographic keys. Having a decentralized public keystore that contains the cryptographic keys of all devices enables the secure distribution of the session keys that will be used as pre-shared keys for PSK-based security protocols (TLS-PSK, DTLS-PSK ) As a result, end-to-end security (authentication, confidentiality, and integrity) between nodes and servers can be achieved with minimum resources.

15 REFERENCES [1] Ethereum: A Secure Decentralized Generalized Transaction Ledger. [2] Ethereum White paper. [3] Light client protocol. [4] Ericsson, Bootstrapping Security", [5] Terminology for Constrained-Node Networks", Tools.ietf.org, 2017 [6] RFC The Transport Layer Security (TLS) Protocol Version 1.2", Tools.ietf.org, [7] RFC Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)

Technical Specifications for Platform Development

Technical Specifications for Platform Development Technical Specifications for Platform Development Contents 1. General Information about the Product... 2 2. Software Requirements... 3 2.1. Functional Requirements... 3 2.2. Server Requirements... 4 3.

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN SESSION ID: GPS-R09B BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN Sid Desai Head of Business Development Remme.io @skd_desai Agenda Our relationship to our digital-selves Evolution of Authentication

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation 2017 Executive Summary (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation www.blockchainofthings.com Abstract The Internet of Things (IoT) is not secure and we

More information

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany Blockchain without Bitcoin Muralidhar Gopinath October 19, 2017 University at Albany What is Blockchain? Contains records (blocks) that are linked (chained) to one another using cryptography Each block

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology 2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

Technical White Paper. Cube Engine Version 1.0

Technical White Paper. Cube Engine Version 1.0 Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow

More information

Introduction to Blockchain

Introduction to Blockchain Diogo Trentini e Lauro Gripa Neto Introduction to Blockchain www.magrathealabs.com source: Scott Adams' Dilbert source: Gartner Inc. SUMMARY 1. 2. 3. 4. 5. Introduction Theoretical concepts Applications

More information

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager

Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Ethereum Consortium Blockchain in Azure Marketplace Christine Avanessians Senior Program Manager Overview The next phase of our support of blockchain on Microsoft Azure is the release of the Ethereum Consortium

More information

A Blockchain-based Mapping System

A Blockchain-based Mapping System A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

Securing Smart Meters with MULTOS Technical Overview

Securing Smart Meters with MULTOS Technical Overview Securing Smart Meters with MULTOS Technical Overview Introduction This paper is written for those involved in the specification, procuring and design of smart metering infrastructure at a technical level.

More information

Previous Name: D3. Fourth Estate. A secure, decentralized news data storing and sharing solution for journalists

Previous Name: D3. Fourth Estate. A secure, decentralized news data storing and sharing solution for journalists Previous Name: D3 Fourth Estate A secure, decentralized news data storing and sharing solution for journalists Aaron Chong Remini Yip International Student Blockchain Competition s Presentation 1 Problem

More information

OW TO PARTICIPAT HOW TO PARTICIPATE

OW TO PARTICIPAT HOW TO PARTICIPATE OW TO PARTICIPAT HOW TO PARTICIPATE How to take part in FTEC Pre-sale and Token Sale? We will publish token sale address on our official ftec.io and ftec.ai websites accurate on the day of Pre-sale and

More information

a new cryptocurrency STK GLOBAL PAYMENTS USER GUIDE USER GUIDE: PARTICIPATING IN IN STK STK TOKEN TOKEN SALE USING SALE MYETHERWALLET

a new cryptocurrency STK GLOBAL PAYMENTS USER GUIDE USER GUIDE: PARTICIPATING IN IN STK STK TOKEN TOKEN SALE USING SALE MYETHERWALLET a new cryptocurrency STK GLOBAL PAYMENTS USER GUIDE USER GUIDE: PARTICIPATING IN IN STK STK TOKEN TOKEN SALE USING SALE MYETHERWALLET USING MYETHERWALLET 1 TABLE OF CONTENTS INTRODUCTION 3 CREATING A NEW

More information

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner. Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

CREDITS Web-version 2 Web-version specification CREDITS Desktop Client vs. Web-client What is the CREDITS Wallet? 2 1.

CREDITS Web-version 2 Web-version specification CREDITS Desktop Client vs. Web-client What is the CREDITS Wallet? 2 1. CREDITS Web-version 2 Web-version specification 2 1.1 CREDITS Desktop Client vs. Web-client 2 1.2 What is the CREDITS Wallet? 2 1.3 Essential Functionality 2 2. System Requirements 4 3. Creating New Account

More information

M2MD Communications Gateway: fast, secure, efficient

M2MD Communications Gateway: fast, secure, efficient Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Using EAP-TLS with TLS 1.3 draft-mattsson-eap-tls IETF 101, EMU, MAR John Mattsson, MOHIT sethi

Using EAP-TLS with TLS 1.3 draft-mattsson-eap-tls IETF 101, EMU, MAR John Mattsson, MOHIT sethi Using EAP-TLS with TLS 1.3 draft-mattsson-eap-tls13-02 IETF 101, EMU, MAR 19 2018 John Mattsson, MOHIT sethi draft-mattsson-eap-tls13 EAP-TLS is widely supported for authentication in Wi-Fi. EAP-TLS is

More information

Securing Network Communications

Securing Network Communications Securing Network Communications Demonstration: Securing network access with Whitenoise Labs identity management, one-time-pad dynamic authentication, and onetime-pad authenticated encryption. Use of Whitenoise

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake. DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits

More information

Blockchain and Additive Manufacturing

Blockchain and Additive Manufacturing Blockchain and Additive Manufacturing January 10, 2019 Presentation to the South Texas Section, AIChE Lisa M. Smith Chief Corporate Development Officer Data Gumbo Corporation Blockchain Basics Data Gumbo

More information

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager

Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Ethereum Consortium Network Deployments Made Easy Christine Avanessians Senior Program Manager Update History October 19, 2016: The document was revised to reflect the most recent update to the template.

More information

WAVE: A decentralised authorization system for IoT via blockchain smart contracts

WAVE: A decentralised authorization system for IoT via blockchain smart contracts WAVE: A decentralised authorization system for IoT via blockchain smart contracts Michael P Andersen, John Kolb, Kaifei Chen, Gabe Fierro, David E. Culler, Raluca Ada Popa The problem Authorization mechanisms

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

Overview of PBI-blockchain cooperation technology

Overview of PBI-blockchain cooperation technology FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview

More information

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4 Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4

More information

Direct, DirectTrust, and FHIR: A Value Proposition

Direct, DirectTrust, and FHIR: A Value Proposition Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

The Internet of Things and Security

The Internet of Things and Security INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet

More information

Decentralized Internet Resource Trust Infrastructure

Decentralized Internet Resource Trust Infrastructure Decentralized Internet Resource Trust Infrastructure Bingyang Liu, Fei Yang, Marcelo Bagnulo, Zhiwei Yan, and Qiong Sun Huawei UC3M CNNIC China Telecom 1 Critical Internet Trust Infrastructures are Centralized

More information

Design and development of a distributed, secure and resilient vault management system

Design and development of a distributed, secure and resilient vault management system Design and development of a distributed, secure and resilient vault management system Mathonet G. University of Liège, Belgium June 2017 Mathonet G. (University of Liège, Belgium) Design and development

More information

Gnosis Safe Documentation. Gnosis

Gnosis Safe Documentation. Gnosis Gnosis Aug 14, 2018 Content 1 Learn more about Gnosis Safe 3 1.1 Smart Contract Overview........................................ 3 1.2 Services Overview............................................ 10

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

Credential Management for Internet of Things Devices

Credential Management for Internet of Things Devices Credential Management for Internet of Things Devices Internet Protocol for Smart Objects (IPSO) Alliance Editors: Hannes Tschofenig, ARM Limited Ned Smith, Intel Contributors: Mark Baugher, Consultant

More information

Hyperledger fabric: towards scalable blockchain for business

Hyperledger fabric: towards scalable blockchain for business Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus

More information

GENESIS VISION NETWORK

GENESIS VISION NETWORK GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit

More information

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS WHAT IS POLARCOIN? (POL) Polarcoin is an open source peer to peer decentralized cryptocurrency. There is no server for this network cause computer

More information

M2MD Communications Gateway: fast, secure and efficient

M2MD Communications Gateway: fast, secure and efficient Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular

More information

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter White Paper Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter Overcoming Security, Privacy & Compliance Concerns 333 W. San Carlos Street San Jose, CA 95110 Table of Contents

More information

CLN CLN TOKEN SALE. How to Participate Using MyEtherWallter

CLN CLN TOKEN SALE. How to Participate Using MyEtherWallter CLN CLN TOKEN SALE How to Participate Using MyEtherWallter Colu Technologies DLT limited 3 Table of Contents Introduction 4 Create New Account 5 Step 1: Go to https://www.myetherwallet.com 5 Step 2: Go

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

LIPPU-API: Security Considerations

LIPPU-API: Security Considerations LIPPU-API: Security Considerations Interoperability of ticket and payment systems project 27th of November 2017 1 Contents 1 Introduction... 2 2 Threat modeling... 2 3 Layered security architecture and

More information

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose... Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7

More information

For further information about the GRID token sale, please visit gridplus.io/token-sale.

For further information about the GRID token sale, please visit  gridplus.io/token-sale. 1 1 Introduction Thank you for your interest in purchasing GRID tokens. The following information has been organized to help you complete your purchase using MyEtherWallet, Mist, or MetaMask. For further

More information

Blockchain-based Firmware Update Framework for Internet-of-Things Environment

Blockchain-based Firmware Update Framework for Internet-of-Things Environment Int'l Conf. Information and Knowledge Engineering IKE'18 151 Blockchain-based Firmware Update Framework for Internet-of-Things Environment Alexander Yohan 1, Nai-Wei Lo 2, Suttawee Achawapong 3 Department

More information

Town Crier. Authenticated Data Feeds For Smart Contracts. CS5437 Lecture by Kyle Croman and Fan Zhang Mar 18, 2016

Town Crier. Authenticated Data Feeds For Smart Contracts. CS5437 Lecture by Kyle Croman and Fan Zhang Mar 18, 2016 Town Crier Authenticated Data Feeds For Smart Contracts CS5437 Lecture by Kyle Croman and Fan Zhang Mar 18, 2016 Smart Contract Decentralized App: Programs are executed by all miners who reach consensus

More information

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm

More information

Secure Communications on VoIP Networks

Secure Communications on VoIP Networks Mediatrix Multi-service Gateways v. 2.0.41.762 2017-12-21 Table of Contents Table of Contents Internet Telephony Network Security 4 Authentication 4 X-509 Certificates 4 Transport Layer Security (TLS)

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains

Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains Not ACID, not BASE, but SALT A Transaction Processing Perspective on Blockchains Authors: Stefan Tai, Jacob Eberhardt and Markus Klems Presentation by: Georgiou Zacharias and Paschalides Demetris 1 Overview

More information

ETHERNITY DECENTRALIZED CLOUD COMPUTING

ETHERNITY DECENTRALIZED CLOUD COMPUTING ETHERNITY DECENTRALIZED CLOUD COMPUTING Whitepaper 4 August 2013 v1.3 HODL UG crowdsale@ethernity.cloud DISCLAIMER: The ETHERNITY Tokens are a crypto asset that is currently being developed by the ETHERNITY

More information

Security: Focus of Control

Security: Focus of Control Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali Blockstack, a New Internet for Decentralized Apps Muneeb Ali The New Internet Problems with the traditional internet End-to-end design principle for the Internet. *1981 Saltzer, Reed, and Clark paper End-to-end

More information

arxiv: v1 [cs.cr] 29 Sep 2017

arxiv: v1 [cs.cr] 29 Sep 2017 Decentralized User-Centric Access Control using PubSub over Blockchain Sayed Hadi Hashemi 1, Faraz Faghri 1, Roy H Campbell University of Illinois at Urbana-Champaign arxiv:1710.00110v1 [cs.cr] 29 Sep

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

TFS WorkstationControl White Paper

TFS WorkstationControl White Paper White Paper Intelligent Public Key Credential Distribution and Workstation Access Control TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 Important Concepts 4 Logon Modes 4 Password

More information

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017 Technical White Paper of MOAC Mother of All Chains June 8 th, 2017 [Abstract] MOAC is to design a scalable and resilient Blockchain that supports transactions, data access, control flow in a layered structure.

More information

NON-TECHNICAL WHITEPAPER Version 1.0

NON-TECHNICAL WHITEPAPER Version 1.0 NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Implementing Secure Socket Layer

Implementing Secure Socket Layer This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client

More information

REM: Resource Efficient Mining for Blockchains

REM: Resource Efficient Mining for Blockchains REM: Resource Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse Vancouver, Canada 13 September 2017 USENIX Security 2017 1 The Cryptocurrency Vision

More information

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency

More information

Security Architecture Models for the Cloud

Security Architecture Models for the Cloud White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,

More information

OneID An architectural overview

OneID An architectural overview OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities

More information

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE. INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building

More information

RICOH Unified Communication System. Security White Paper (Ver. 3.5) RICOH Co., Ltd.

RICOH Unified Communication System. Security White Paper (Ver. 3.5) RICOH Co., Ltd. RICOH Unified Communication System Security White Paper (Ver. 3.5) - UCS terminals P3500, P1000 P3000, S7000 - Apps (for Windows) (for ipad/iphone) (for Mac) (for Android) - UCS for IWB RICOH Co., Ltd.

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

Security and Privacy in the Internet of Things : Antonio F. Skarmeta Security and Privacy in the Internet of Things : Antonio F. Skarmeta University of Murcia (UMU) SPAIN Motivation Security and privacy concerns were always there but we need to move from

More information

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited Securing IoT applications with Mbed TLS Hannes Tschofenig Agenda Theory Threats Security services Hands-on with Arm Keil MDK Pre-shared secret-based authentication (covered in webinar #1) TLS Protocol

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

Trust. Trustworthiness Trusted. Trust: Who? What? When? Why? How?

Trust. Trustworthiness Trusted. Trust: Who? What? When? Why? How? Trust Trustworthiness Trusted Trust: Who? What? When? Why? How? 1 Certification / Assessment is a spectrum GAFAT Websites Apps Self Asserted Basic Check Self Certified Independent Verification Independently

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

Delegated Authenticated Authorization for Constrained Environments

Delegated Authenticated Authorization for Constrained Environments Delegated Authenticated Authorization for Constrained Environments Stefanie Gerdes, Olaf Bergmann, Carsten Bormann {gerdes bergmann cabo}@tzi.org Universität Bremen NPSec 14, 2014-10-21 Motivation Smart

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Lecture 44 Blockchain Security I (Overview)

Lecture 44 Blockchain Security I (Overview) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Prof. Praveen Jayachandran Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 44 Blockchain

More information

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar

Unblockable Chains. Is Blockchain the ultimate malicious infrastructure? Omer Zohar Unblockable Chains Is Blockchain the ultimate malicious infrastructure? Omer Zohar #WhoAmI Researching malware backbones for the past decade Following blockchain eco-system since 2013 Finally had some

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems

More information

Mobile WiMAX Security

Mobile WiMAX Security WHITE PAPER WHITE PAPER Makes Mobile WiMAX Simple Mobile WiMAX Security Glossary 3 Abstract 5 Introduction to Security in Wireless Networks 6 Data Link Layer Security 8 Authentication 8 Security Association

More information

CSC 5930/9010 Modern Cryptography: Public-Key Infrastructure

CSC 5930/9010 Modern Cryptography: Public-Key Infrastructure CSC 5930/9010 Modern Cryptography: Public-Key Infrastructure Professor Henry Carter Fall 2018 Recap Digital signatures provide message authenticity and integrity in the public-key setting As well as public

More information

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx Health Data & Blockchain: The New Sharing Frontier Michael Dillhyon, CCO, Graftworx Twitter: @SwissGator Overview Who? Background Why? Enterprise & Consumer Benefit What? (Blockchain of course) Value Prop

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

Applying Context to Web Authentication

Applying Context to Web Authentication Applying Context to Web Authentication John Linn, Burt Kaliski, and Moti Yung, RSA Laboratories; Magnus Nyström, RSA Security Inc. Prepared for W3C Workshop on Transparency and Usability of Web Authentication,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS

INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS E M B E D D E D S O F T W A R E W H I T E P A P E R w w w. m e n t

More information