User-centric Key Management for End-to-End IoT Security and Privacy

Loading...
Thumbnail Image
Author
Vizár, D.
Kassapoglou-Faist, C.
Berguerand, R.
DOI
Abstract
The extensive sensing of human beings in the Internet of things (IoT) applications generates large volumes of personal data. The large attack surface of IoT systems made of constrained, (inter)connected embedded devices systems, calls for end to end-to-end (E2E) encryption, but the difficult key management -hampers adoption. CSEM designed a unique solution that integrates E2E encryption and electronic data sharing in the spirit of GDPR.
Publication Reference
CSEM Scientific and Technical Report 2022, 20
Year
2022
Sponsors