Industry 4.0 heavily builds on massive deployment of Industrial Internet of Things (IIoT) devices to monitor every aspect of the manufacturing processes. Since the data gathered by these devices impact the output of critical processes, identity management and communications security are critical aspects, which commonly rely on the deployment of X.509 certificates. Nevertheless, the provisioning and management of individual certificates for a high number of IIoT devices involves important challenges. In this paper, we present a solution to improve the management of digital certificates in IIoT environments, which relies on partially delegating the certificate enrolment process to an edge server. However, in order to preserve end-to-end secur...
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores t...
Domain Name Service (DNS) and its certification related resource records are appealing alternative t...
Internet of Things-based environments pose various challenges due to their anytime/anywhere computin...
Digital certificates are regarded as the most secure and scalable way of implementing authentication...
Edge computing provides a unified platform for computing, networking, and storage resources, enablin...
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberatt...
Industrial Internet of Things applications are distributed Cyber-Physical systems with long life-cyc...
The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance...
The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance...
Identity and Access Management (IAM) is an integral part of the security solution for IoT. Today, th...
International audienceThe Internet of Things aims at connecting everything, ranging from individuals...
Recent findings show that many mission critical Internet of Things (IoT) applications are exposed to...
An era ago, projecting artificial intelligence as the pillar of next-generation technology would hav...
The Industrial IoT is one of the key technologies to improve industrial production efficiency. The e...
Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnect...
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores t...
Domain Name Service (DNS) and its certification related resource records are appealing alternative t...
Internet of Things-based environments pose various challenges due to their anytime/anywhere computin...
Digital certificates are regarded as the most secure and scalable way of implementing authentication...
Edge computing provides a unified platform for computing, networking, and storage resources, enablin...
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberatt...
Industrial Internet of Things applications are distributed Cyber-Physical systems with long life-cyc...
The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance...
The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance...
Identity and Access Management (IAM) is an integral part of the security solution for IoT. Today, th...
International audienceThe Internet of Things aims at connecting everything, ranging from individuals...
Recent findings show that many mission critical Internet of Things (IoT) applications are exposed to...
An era ago, projecting artificial intelligence as the pillar of next-generation technology would hav...
The Industrial IoT is one of the key technologies to improve industrial production efficiency. The e...
Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnect...
This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores t...
Domain Name Service (DNS) and its certification related resource records are appealing alternative t...
Internet of Things-based environments pose various challenges due to their anytime/anywhere computin...