The world of the Internet of Things (IoT) offers wonderful opportunities. The concept of “everything can talk to everything” opens up many productive opportunities. However, the concept of “everything can talk to everything” is also an enemy of both device and data, trust and security.
Methods to establish the authentication, security and management of IoT devices is critical. Fortunately the foundation for such solutions has substantially been established by others. TrustCentral refers to this solved portion of the problem as 2-Dimensional IoT security and management. There a number of vendors which provide one of more of the elements that make up 2-Dimensional IoT. TrustCentral does not offer stand-alone 2-Dimensional IoT solutions.
TrustCentral builds 3-Dimensional IoT authentication, security and management on top of 2-Dimensional IoT. 3-Dimensional IoT is TrustCentral’s focus. This innovative technology evolved from an early concept of TrustCentral’s primary inventor (see below) which is: “let’s use PKI in a different way so endpoints can authenticate and securely communicate with each other”.
SUPPORTING THE NEEDS OF MANAGEMENT
Devices need to be trustworthy. Management needs to be able to trust the data from authenticated devices. When considering the trustworthiness of data from a device, management should be confident that the device has not been communicating with unknown or unauthorized endpoints. The reputation of devices and their data (based on their performance) is important. The protection of devices and their interaction with other endpoints is vital.
TrustCentral is offering a 3-Dimensional approach to the IoT that will provide specific benefits in these areas. The specific solutions described on this site are developed using tools from the numerous patented elements of TrustCentral’s Trust Stack. This technology is being offered in the form of three proprietary elements: a custom API, an innovative Attribute Authority, plus a software component for IoT devices and other endpoints. Through the creative application of the Trust Stack’s building blocks, the customers of TrustCentral (e.g., systems integrators, solution providers, large enterprises, governments, hardware manufactures, etc.) may develop and offer solutions such as these
EXAMPLE USE CASES:
- Capability to deliver artificial intelligence and machine learning sourced instructions to devices into protected, secured areas to enhance operations
- Securing designated legacy devices within an OT space into secure zones
- Securing authenticated Vendor Access to only those devices for which a vendor is responsible
- Securing legacy, insecure devices that provide valuable services in a hostile environment
- Protecting devices from DDOS attacks
- Enhancing Blockchain (which provides immutability but not correctness): “Trusted transactions require trusted provenance”
- Reputation scoring of both devices and humans utilizing devices
A SOLUTION THAT WILL SCALE
Critically important for the IoT is that TrustCentral’s solution (built on a foundation of PKI) will not only provide IoT devices with tools to help them keep themselves secure, but will also scale.
TrustCentral’s Security Ecosystem has been designed by the highly-respected Dr. David W. Kravitz. Among Dr. Kravitz’s many impressive accomplishments is the invention of the Digital Signature Algorithm – DSA. TrustCentral’s first nine patents have been issued (with multiple patents-pending).