Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA

Today, smart devices and services have become a part of our daily life. These devices and services offer a richer user experience with a much higher quality of services than before. Many of them utilize sensing functions via cloud architecture to perform remote device controls and monitoring. Genera...

Full description

Bibliographic Details
Main Authors: Daiki Yamakawa, Takashi Okimoto, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/6610863
id doaj-32d320615c6443d6a457884662da02ed
record_format Article
spelling doaj-32d320615c6443d6a457884662da02ed2021-03-01T01:14:10ZengHindawi-WileySecurity and Communication Networks1939-01222021-01-01202110.1155/2021/6610863Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CADaiki Yamakawa0Takashi Okimoto1Songpon Teerakanok2Atsuo Inomata3Tetsutaro Uehara4Cyber Security LaboratoryCyber Security LaboratoryCyber Security LaboratoryCyber Security LaboratoryCyber Security LaboratoryToday, smart devices and services have become a part of our daily life. These devices and services offer a richer user experience with a much higher quality of services than before. Many of them utilize sensing functions via cloud architecture to perform remote device controls and monitoring. Generally, the security of the communication between these devices and the service provider (e.g., cloud server) is achieved by using the TLS protocol via PKI standard. In this study, we investigate the risk associating with the use of public certificate authorities (CAs) in a PKI-based IoT system. An experiment is conducted to demonstrate existing vulnerabilities in real IoT devices available in the market. Next, the use of a private CA in the cloud-centric IoT architecture is proposed to achieve better control over the certificate issuing process and the validity period of the certificate. Lastly, the security analysis pointing out the strengths and drawbacks of the proposed method is discussed in detail.http://dx.doi.org/10.1155/2021/6610863
collection DOAJ
language English
format Article
sources DOAJ
author Daiki Yamakawa
Takashi Okimoto
Songpon Teerakanok
Atsuo Inomata
Tetsutaro Uehara
spellingShingle Daiki Yamakawa
Takashi Okimoto
Songpon Teerakanok
Atsuo Inomata
Tetsutaro Uehara
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA
Security and Communication Networks
author_facet Daiki Yamakawa
Takashi Okimoto
Songpon Teerakanok
Atsuo Inomata
Tetsutaro Uehara
author_sort Daiki Yamakawa
title Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA
title_short Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA
title_full Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA
title_fullStr Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA
title_full_unstemmed Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA
title_sort enhancing digital certificate usability in long lifespan iot devices by utilizing private ca
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0122
publishDate 2021-01-01
description Today, smart devices and services have become a part of our daily life. These devices and services offer a richer user experience with a much higher quality of services than before. Many of them utilize sensing functions via cloud architecture to perform remote device controls and monitoring. Generally, the security of the communication between these devices and the service provider (e.g., cloud server) is achieved by using the TLS protocol via PKI standard. In this study, we investigate the risk associating with the use of public certificate authorities (CAs) in a PKI-based IoT system. An experiment is conducted to demonstrate existing vulnerabilities in real IoT devices available in the market. Next, the use of a private CA in the cloud-centric IoT architecture is proposed to achieve better control over the certificate issuing process and the validity period of the certificate. Lastly, the security analysis pointing out the strengths and drawbacks of the proposed method is discussed in detail.
url http://dx.doi.org/10.1155/2021/6610863
work_keys_str_mv AT daikiyamakawa enhancingdigitalcertificateusabilityinlonglifespaniotdevicesbyutilizingprivateca
AT takashiokimoto enhancingdigitalcertificateusabilityinlonglifespaniotdevicesbyutilizingprivateca
AT songponteerakanok enhancingdigitalcertificateusabilityinlonglifespaniotdevicesbyutilizingprivateca
AT atsuoinomata enhancingdigitalcertificateusabilityinlonglifespaniotdevicesbyutilizingprivateca
AT tetsutarouehara enhancingdigitalcertificateusabilityinlonglifespaniotdevicesbyutilizingprivateca
_version_ 1714842433989115904