Factories of the Future
Media & Entertainment
Smart Cities
Smart Energy
Smart Ports
SME Opportunities
Societal Impacts
Technology Development
Telecoms Providers
5G Automotive
5G CAM Standardisation
5G Corridors
5G Multimodal Connectivity
5G Transport Network
Artificial Intelligence & Machine Learning
Artificial Intelligence & Machine Learning in big data
Artificial Intelligence & Machine Learning technologies
Big data
Big data algorithms
Big data analytics
Collaborative Classification and Models
Business Models, Process Improvement, Contract Management, KPIs and Benchmarking Indexes
Collaboration Risk and Value Sharing
Collaborative Planning and Synchromodality
Customs & Regulatory Compliance
Environmental Performance Management
Logistics Optimisation
Stock Optimisation
Supply Chain Corrective and Preventive Actions (CAPA)
Supply Chain Financing
Supply Chain Visibility
Common Information Objects
Customs Declarations
Transport Service Description
Transport Status
Computing and Processing
Big Data Management and Analytics
Knowledge Graphs
Machine Learning
Stream Processing
Connectivity Interfaces
Technologies (Bluetooth, Ethernet, Wifi)
Data Management, Simulation and Dashboards
Data Fusion
Data Governance, Integrity, Quality Management and Harmonization
Event Handling
Open Data
Statistics and Key Performance Indicators (KPIs)
Data market
Data ecosystem
Data marketplace
Data Platform
Data Providers
IoT Controllers
IoT Gateways
IoT Sensors
Tracking Sensors
Digitisation Frameworks
Control Towers
Data Pipelines
National Single Windows
Port Community Systems
Data Federation
Platform Federation
Industrial IoT Sectors
Rail Sector Active Predictive Maintenance
Data interoperability
Data interoperability mechanisms
Interoperability solutions
Platform interoperability
IoT Secuirty, Privacy and Safety Systems
PKI Technology
Data privacy preserving technologies
Privacy preserving technologies
Project Results
5G-SOLUTIONS Deliverables
5G-SOLUTIONS Publications
CHARIOT Capacity Building and Trainings
CHARIOT Deliverables
CHARIOT Publications
SELIS Deliverables
SELIS Publications and Press Releases
Project Results - 5g Routes
5G-ROUTES Deliverables
5G-ROUTES Innovation
5G-ROUTES Publications
Project Results - TRUST
TRUST Deliverable
TRUSTS Publications
Safety, Security and Privacy Systems
Access Management
Coordinated Border Management
Information Security
International Organisations
Risk Assessment and Management
Risk Management
Safety and Security Assessment
Source Code Analysis
Sectors and Stakeholders
Airports and Air Transport
Banks, investors and other funding providers
Custom Authorities
Facilities, Warehouses
Freight Forwarders
Inland Waterways
Multimodal Operators
Ports and Terminals
Road Transport
Smart Buildings
Trusties and other Intermediary Organizations
Urban and Countryside Logistics
Urban Logistics
Sectors and Stakeholders - TRUST
Audit & Law firms
Corporate offices
Financial Institutions
Secured Data
Secured Infrastructure
Secured Platform
Data sovereignty
Good Distribution Practices
International data standards
International Organization for Standardization (ISO)
World Customs Organization (WCO)
Supply Chain Management
Business Models, Process Improvement, Contract Management, KPIs and Benchmarking Indexes
Risk Management
Risk-Based Controls
Screening and tracking
Supervision Approach
Agile Deployment, Configuration Management
Business Applications
Business Integration Patterns, Publish-Subscribe
Cloud Technologies/Computing, Services Virtualisation
Community Node Platform and Application Monitoring
Connectivity Technologies (Interfaces and Block Chain)
Hybrid S/T Communication and Navigation Platforms
IoT (Sensors, platforms)
Physical Internet (PI)
Public key infrastructure (PKI)
Radio-frequency identification (RFID)

Public key infrastructure (PKI)

Top 5 Ways to Secure IoT Devices With PKI
ELLEN BOEHM 26/03/2020 00:00:00

There’s a lot of connected devices out there. That may seem like an obvious statement given that everyone seems to be walking around with a mobile phone, tablet, computer, and wireless headset. But what about all the devices that aren’t entertainment based? I’m thinking about all the connected vehicles, medical devices, routers, smart locks, thermostats, wearables -- this list never seems to end.

In fact, Gartner predicts there will be 25 billion connected “things” by 2021.* With that kind of ubiquity, one key question arises: How are they secured?

As the IoT landscape and security requirements evolve, device manufacturers need a cost-effective and scalable solution to secure IoT devices from increasing threats and regulations. We've compiled a list from a recent whitepaper that shows how public key infrastructure (PKI) can help your teams build with security in mind from the beginning.

Where PKI fits into IoT Security
Before we get to our top ways to secure IoT devices, let’s breakdown some advantages of using PKI for your IoT security needs. With all the connected devices coming online, we need a way to identify them. In the next two years, 42% of IoT devices will rely primarily on digital certificates for identification and authentication. In fact, the rapid growth of digital certificates can be largely attributed to the critical use cases that IoT manufacturers require through device identity, authentication, and encryption. However, without a proper way to issue and manage the millions of certificates across IoT deployments, scalability will be challenging.

This is where PKI comes into the picture.

Public key infrastructure is a framework composed of hardware, software, policies and procedures to help create, management, manage, distribute, and update these digital certificates overtime. For decades, PKI has served as the backbone of Internet security, and now it’s emerging as a flexible and scalable solution uniquely capable of addressing the data and device security needs of the IoT.

Let's see how.

Ways to Secure IoT Devices with PKI

Use Unique Identities: By embedding a cryptographically verifiable identity into each device, you can enable secure network access and code execution throughout the device lifecycle. These certificates can also be customized based on manufacturer policy and updated or revoked on a per-device basis.

Define and Set Security Standards: PKI’s open standard allows you to define a system cryptographically, with flexible options for trusted roots, revocation, and standard protocols for certificate enrollment and deployment — such as REST API, SCEP and EST.

Scale Security as Your ‘Things’ Grow: By using asymmetric encryption means that all certificates can be issued from a single trusted Certificate Authority that is tightly controlled. This disconnected verification model allows devices and applications to authenticate to one another without the need for a centralized server or agent-based software

Maintain Robust Security: When digital certificates are issued from a well-managed PKI, they offer much stronger protection than other authentication methods. IoT devices can also utilize secure hardware elements for cryptographic key storage and employ validity periods that far exceed the usable lifetime of passwords or tokens.

Secure with a Minimal Footprint: A major advantage of using PKI is that it allows manufacturers to implement safeguards with minimal footprint on the device. Even devices with low computational power and memory can still use asymmetric keys. Elliptic Curve Cryptography (ECC) is quickly becoming the algorithm of choice for IoT, using smaller key sizes ideal for networked devices and sensors.

Reference Link

Attached Documents

The “CHARIOT IoT Search Index” aims to provide a web location where publications, articles, and relevant documents can be centralized hosted in a well-structured and easily accessed way.


Contact Us
Enter Text
Contact our department