How to fix validating identity wifi


The storage shall be decentralized in a way, that all elements of the system carry some version of the blockchain.

Public Key Infrastructure – ecosystem that allows creation and management of digital certificates (X.509).

There are numerous Io T manufacturers and application development companies, and thousands of already deployed Io T devices that potentially can be used by the attackers, as it recently happened several times. I will show how to use the most popular conceptual approach today – a blockchain, put on it the proven technology of the Internet – the PKI, and with that limit access to the devices to mutually authenticated sessions, where both identities: of the requestor and the device are cryptographically verifiable.

The technology used in this blogpost was developed in

Lets call these records “creation Looking at the diagram, it is easy to spot, that walking up the “create” events, we can get from any device, to the corresponding “create” of L0. With some significant differences: For the purpose of this limited use-case, we’ll set that responsibility to L0, our main home PC.

For that, any device creating an event, will send its full Ledger to the Miner and the latter will merge it and send it back.

If you put it in one word, that would be “decentralization”. While some people don’t mind, others are concerned about the situation, where handful of major players running their Clouds, and the rest of the world trusting them blindly with their data.Keep in mind, that L3 devices would be authorized by L2 identity.So by the end of the process, we will have that all devices own a valid certificate, connected by its content to its ancestors up to L0, and also holding the proof of its creation, signed by the authorizing entity.Now, L3.3 will be able to verify, that the X.509 certificate, that L3.4 owns, contains the right public key, by manipulating the events in the Ledger.In this blogpost, we’ve seen a smart-home, where home appliances and computers identities are members of global PKI, and their common history being kept on limited functionality event ledger – the blockchain.Thanks to the progress, secure remote access is easily solvable.

You must have an account to comment. Please register or login here!