Authentication Techniques for the IoT
For RSA and Mobile World Congress 2017, and the most prominent battle cry related to IoT security, notably regarding identity and authentication. Many security vendors, OEMs, silicon IP & semiconductors, carriers, and other service providers are keen to exploit the opportunity, and are keen on promoting various solutions that will tackle the issue. Identity is an issue within all layers of the IoT: perception, infrastructure (network), and application. Authentication is required to establish trusted connections, and this relies on the ability to correctly identify the various assets (devices, people, servers, applications) throughout the value chain. The various efforts are promoting private and public, as well as one-time, signature based techniques. Vendors are promoting authentication techniques in cloud-centric IoT environments, as well as for resource-constrained devices. There is no clear decisive method that currently stands out as developers try to adapt traditional mechanisms to the IoT.
To find out more about subscribing:
- Expectations and Considerations for the Identity of Things
- Biometric Payments
- Mobile Ticketing: The Diversification Opportunity
- Why Mobile Ticketing Needs to be More than A Virtualization Tool
- Did Apple Miss the Bus - The Display-Integrated Fingerprint Sensor Gives the Industry a Much-Needed Push