{"title":"Trustworthy things","authors":"H. Birkholz, T. Fossati","doi":"10.1145/3488661.3494034","DOIUrl":null,"url":null,"abstract":"We postulate that if an IoT device is able to produce trustworthy evidence about itself using Remote Attestation Procedures, it should be possible to augment its affordances with a new \"trustworthiness\" quality that allows to securely bind any information that the device exchanges with a set of trust metrics representing a snapshot of its most recent security state. This new \"trustworthiness affordance\" would be used whenever the device needs to provide application state to its users with strong authenticity, which is often the case when the contribution of the device into some distributed computation has repercussions on the individual or public health and safety.","PeriodicalId":300781,"journal":{"name":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3488661.3494034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We postulate that if an IoT device is able to produce trustworthy evidence about itself using Remote Attestation Procedures, it should be possible to augment its affordances with a new "trustworthiness" quality that allows to securely bind any information that the device exchanges with a set of trust metrics representing a snapshot of its most recent security state. This new "trustworthiness affordance" would be used whenever the device needs to provide application state to its users with strong authenticity, which is often the case when the contribution of the device into some distributed computation has repercussions on the individual or public health and safety.