Digital Certificate/Key Issuance & Management for the IoT

The adoption of IoT technologies is an ever-expanding process. The fervent increase in the number of connected devices over the past few years, however, did not coalesce with the appropriate level of security, which led to an inevitable but more turbulent transition into encryption processes. Still, an alarming percentage of IoT devices and services do not make use of Public Key Infrastructure (PKI) or cryptography. However, driven by security gaps in the identity value chain and bolstered by the increased rate of cyber attacks, digital certificates, and encryption key solutions are set to increase in the near future.

This report focuses on these two vital areas, digital certificate issuance and encryption key management, providing a comprehensive overview of the entire process, covering the debate between enterprise-level and IoT-level PKI, addresses challenges and outlines opportunities for current and future implementers among others. In addition, the report explores the encryption key lifecycle management process analyzing the key steps along the way and offers strategic guidance for services across the spectrum including: quantum-based encryption for key management, hardware security modules, the future evolution of encryption, key storage, cancellation, and many other lifecycle management pitfalls. Further, market data featuring penetration of PKI and issuance of digital certificates across the entire IoT landscape and leading vendors including Entrust Datacard, Gemalto, Globalsign, Intel, Rambus, ISARA, and Exosite. 

Table of Contents

  • 1. EXECUTIVE SUMMARY
  • 2. SECURE IDENTITY PROVISIONING IN THE ENCRYPTION VALUE CHAIN
    • 2.1. Digital Certificates: The Enablers of Secure Identity
    • 2.2. Certificate Issuance Options: Private Versus Public
    • 2.3. Certificates and PKI usage in the Enterprise Versus IoT
    • 2.4. Encryption Key Management
  • 3. STRATEGIC GUIDANCE: DIGITAL CERTIFICATES AND KEY MANAGEMENT IN THE IOT
    • 3.1. Why You Should Care: A Viewpoint for the Future Evolution of IoT Security
    • 3.2. Attractive Value Proposition Will Keep Certificate Issuance on the Implementation List
    • 3.3. Securing Interactions between Key Players in the Value Chain
    • 3.4. Suggestions for Key Life Cycle Management
  • 4. MARKET DATA
    • 4.1. Digital Certificates: Market Sizing
    • 4.2. Technology and Pricing Issues for Low-Capacity IoT Devices
    • 4.3. Gateways and Entering the PKI Value Chain
    • 4.4. Distributed Ledger versus Certificate Authorities
    • 4.5. Sub-Verticals and Focus on PKI
    • 4.6. Gateways Are Not the Bastions of Security They Are Often Made Out to Be
    • 4.7. Obtaining Value and Support Operations for High-Value Applications
    • 4.8. The Clear Focus for the Near Future
  • 5. COMPANY PROFILES
    • 5.1. Entrust Datacard
    • 5.2. Gemalto
    • 5.3. GlobalSign
    • 5.4. Intel
    • 5.5. Rambus
    • 5.6. ISARA
    • 5.7. Exosite
Digital Certificate/Key Issuance & Management for the IoT Image Purchase

Research Information

Price
Log In or Register
Publish Date
1Q 2019
Code
AN-2483
Research Type
Application Analysis Report
Pages
30