{"title":"面向物联网的安全元素:eLock用例:正在进行的工作-邀请论文","authors":"P. Urien","doi":"10.1109/MOBISECSERV.2016.7440228","DOIUrl":null,"url":null,"abstract":"Security and trust are major prerequisites for the deployment of Internet of Things (IoT) infrastructures. In this paper we present secure elements providing TLS and DTLS stacks, and running the CoAP protocol dedicated to IoT systems. These secure elements are used in an electronic lock context, in which the lock is a CoAP server and the key a CoAP client. We define two main security domains one for key interaction with the lock, and the other for key generation. These two domains are associated to applications running in SIM cards managed by mobile applications. Key generators are hosted in secure elements plugged in key servers, built over the RACS protocol. We introduce an innovative double TLS concept that avoids application tampering by cloud provider. Finally we discuss scalability issues of this approach.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Towards secure elements for the Internet of Things: The eLock use case: Work in progress — Invited paper\",\"authors\":\"P. Urien\",\"doi\":\"10.1109/MOBISECSERV.2016.7440228\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security and trust are major prerequisites for the deployment of Internet of Things (IoT) infrastructures. In this paper we present secure elements providing TLS and DTLS stacks, and running the CoAP protocol dedicated to IoT systems. These secure elements are used in an electronic lock context, in which the lock is a CoAP server and the key a CoAP client. We define two main security domains one for key interaction with the lock, and the other for key generation. These two domains are associated to applications running in SIM cards managed by mobile applications. Key generators are hosted in secure elements plugged in key servers, built over the RACS protocol. We introduce an innovative double TLS concept that avoids application tampering by cloud provider. Finally we discuss scalability issues of this approach.\",\"PeriodicalId\":296302,\"journal\":{\"name\":\"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MOBISECSERV.2016.7440228\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MOBISECSERV.2016.7440228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards secure elements for the Internet of Things: The eLock use case: Work in progress — Invited paper
Security and trust are major prerequisites for the deployment of Internet of Things (IoT) infrastructures. In this paper we present secure elements providing TLS and DTLS stacks, and running the CoAP protocol dedicated to IoT systems. These secure elements are used in an electronic lock context, in which the lock is a CoAP server and the key a CoAP client. We define two main security domains one for key interaction with the lock, and the other for key generation. These two domains are associated to applications running in SIM cards managed by mobile applications. Key generators are hosted in secure elements plugged in key servers, built over the RACS protocol. We introduce an innovative double TLS concept that avoids application tampering by cloud provider. Finally we discuss scalability issues of this approach.