5IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection
Sava ZXIVANOVICH1, Branislav TODOROVIC2, Jean Pierre LORRÉ3, Darko TRIFUNOVIC2, Adrian KOTELBA4, Ramin SADRE5 and Axel LEGAY5
1Technology Partnership, Belgrade, Serbia
2Institute for National and International Security (INIS), Belgrade, Serbia
3Linagora Grand Sud Ouest, Toulouse, France
4VTT Technical Research Centre of Finland Ltd, Espoo, Finland
5UCLouvain, Ottignies-Louvain-la-Neuve, Belgium
In a new age of integration of many different services and zero-trust networks, the IoT has to overcome hardware limitations and provide adequate security. Our goal is to provide methods and effective tools to help build a network that is both easy to use and secure. It is based on Pi Platform for Unified Secure Communications, Services and Web-Applications, providing a foundation for home/small/medium office hubs. IoT security is based on the zero-trust philosophy – all communications are encrypted, no unidentifiable device is accepted on the network, each device has to provide its passport with a description of its network behavior and better encryption key generation. This IoT solution also addresses potential configuration problems by allowing trusted third-party providers to remotely access and correctly configure home/small/medium office hubs as well as informing users about any potentially harmful behavior or external access to their equipment.
5.1. Introduction
With the advancement of new technologies ...
Get Cybersecurity in Smart Homes now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.