Zero-Trust Hierarchical Management in IoT

被引:61
|
作者
Samaniego, Mayra [1 ]
Deters, Ralph [1 ]
机构
[1] Univ Saskatchewan, Comp Sci, Saskatoon, SK, Canada
关键词
Internet of Things; Blockchain; Hierarchical Mining; Zero-Trust Management; Edge Computing; INTERNET; THINGS;
D O I
10.1109/ICIOT.2018.00019
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Internet of Things (IoT) is experiencing exponential scalability. This scalability introduces new challenges regarding management of IoT networks. The question that emerges is how we can trust the constrained infrastructure that shortly is expected to be formed by millions of 'things.' The answer is not to trust. This research introduces Amatista, a blockchain-based middleware for management in IoT. Amatista presents a novel zero-trust hierarchical mining process that allows validating the infrastructure and transactions at different levels of trust. This research evaluates Amatista on Edison Arduino Boards.
引用
收藏
页码:88 / 95
页数:8
相关论文
共 50 条
  • [1] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
    Azad, Muhammad Ajmal
    Abdullah, Sidrah
    Arshad, Junaid
    Lallie, Harjinder
    Ahmed, Yussuf Hassan
    INTERNET OF THINGS, 2024, 27
  • [2] A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT
    Tian, Minqiu
    Li, Zifu
    Li, Fenghua
    Cao, Jin
    Guo, Chao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 299 - 306
  • [3] A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures
    Federici, Fabio
    Martintoni, Davide
    Senni, Valerio
    ELECTRONICS, 2023, 12 (03)
  • [4] Tamperproof Data Transmission to Offline IoT Devices in a Zero-Trust Environment
    Vogel, Richard
    Manthey, Robert
    Baumgart, Matthias
    Roschke, Christian
    Ritter, Marc
    Vodel, Matthias
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 817 - 822
  • [5] Zero-Trust Artificial Intelligence?
    Laplante, Phil
    Voas, Jeffrey
    COMPUTER, 2022, 55 (02) : 10 - 12
  • [6] Zero-Trust Marine Cyberdefense for IoT-Based Communications: An Explainable Approach
    Nkoro, Ebuka Chinaechetam
    Njoku, Judith Nkechinyere
    Nwakanma, Cosmas Ifeanyi
    Lee, Jae-Min
    Kim, Dong-Seong
    ELECTRONICS, 2024, 13 (02)
  • [7] Toward Zero-Trust IoT Networks via Per-Packet Authorization
    Zhang, Han
    Wang, Qian
    Zhang, Xiaoli
    He, Yi
    Tang, Bo
    Li, Qi
    IEEE COMMUNICATIONS MAGAZINE, 2024, : 1 - 7
  • [8] A randomization-based, zero-trust cyberattack detection method for hierarchical systems
    Murphy, Sinnott
    Macwan, Richard
    Singh, Vivek Kumar
    Chang, Chin-Yao
    2023 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV, 2023, : 145 - 155
  • [9] ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model
    Ameer, Safwa
    Praharaj, Lopamudra
    Sandhu, Ravi
    Bhatt, Smriti
    Gupta, Maanak
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (03) : 1 - 36
  • [10] Zero-Trust Communication between Chips
    Belwafi, Kais
    Alshamsi, Hamdan
    Ahmed, Ashfaq
    Shoufan, Abdulhadi
    2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC, 2023, : 27 - 31