Explore chapters and articles related to this topic
IoT-Based Electronic Health Records (EHR) Management System Using Blockchain Technology
Published in Rajdeep Chakraborty, Anupam Ghosh, Valentina Emilia Bălaş, Ahmed A Elngar, Blockchain, 2023
The membership service will provide a notion of identity for the users who are going to be transacting on the blockchain. This identity is going to be a digital certificate and users will use this digital certificate to sign their transactions and submit to the blockchain. The benefit of signing this transaction is to authenticate to the blockchain that the user is a legitimate user and it also ensures that the users get right access privileges for transactions they are performing on the network. The digital certificate is provided by a certificate authority. The certificate authority is a pluggable module, and it can be any external certificate authority or the default fabric certificate authority, which is implemented by a fabric network. All of this uses a public-key-based infrastructure.
Automated Service Deployment on an Intent-Driven Campus Network
Published in Ningguo Shen, Bin Yu, Mingxiang Huang, Hailin Xu, Campus Network Architectures and Technologies, 2021
Ningguo Shen, Bin Yu, Mingxiang Huang, Hailin Xu
A digital certificate is an electronic document issued and signed by a certificate authority (CA) to prove the ownership of a public key. Digital certificates can be used to achieve the following: Data encryption: After a key is negotiated between two communication parties using a handshake protocol, all the transmitted messages are encrypted using a single-key encryption algorithm, such as Advanced Encryption Standard (AES).Identity authentication: The identities of both communication parties are signed using public key encryption algorithms such as Rivest-Shamir-Adleman (RSA) and Data Security Standard (DSS) to prevent spoofing.Data integrity: All messages transmitted during communication contain digital signatures to ensure message integrity.
Other technology aspects
Published in Hanky Sjafrie, Introduction to Self-Driving Vehicle Technology, 2019
Despite differences in architecture and technical details in these standards, secure V2X communication generally employs a Public Key Infrastructure (PKI)Public Key Infrastructure (PKI) to facilitate credential verification of all communication partners, as well as to maintain trust relationship between authorities in multiple V2X networks. Proof of identity is usually conducted by verifying the digital certificatedigital certificate of the communication partner. The digital certificate is issued by an independent entity called the certificate authority (CA)certificate authority (CA). The primary role of CAs is to act as a trusted entity, which confirms that the holders of the issued digital certificate really are who they claim to be. Another task of CAs is to maintain the Certificate Revocation List (CRL)Certificate Revocation List (CRL), which lists all certificates that ought not be trusted, despite their active validity period. With the help of public-key cryptography, and one-way hash functions, the digital certificate of the other communication partner can be authenticated before initiating the secure communication. Detailed explanations of PKI, public-key cryptography and certificate management are beyond the scope of this book. Interested readers are referred to technical books dedicated on this topic, such as [2] or [7].
Plug and Charge Solutions with Vehicle-to-Grid Communication
Published in Electric Power Components and Systems, 2023
PKI is used to create, manage and distribute digital certificates. PKI structure is distributed in three stages. The first level is Root Certificate Authorities (V2G-Root, MO Root, OEM-Root, PE-Private Root). The second level is subordinate CAs (Sub-CAs). The third level is Leaf Certificates for authentication (EVSE-Leaf Certificate, OEM-provisioning leaf certificate, contract certificate). The Root CA is the trust base for the entire system. The root CA delegates the task of issuing certificates to the sub-CA. Digital certificates are proof of identity for communicating entities. A sub-CA 1 and a sub-CA 2 can be operated in each PKI (OEM, MO, CPO). At least one sub-CA is required, optionally two sub-CAs or there can be only sub-CA1 without sub-CA2. The certificate is a proof that the public key (associated with a private key) has been signed by a trusted entity and that no further certificates can be derived (signed) from them.
A Public Key Authentication and Privacy Preserving Model for Securing Healthcare System
Published in IETE Journal of Research, 2021
In the literature, numerous strategies for the preservation of privacy have been proposed. The public key infrastructure (PKI) is a standard-based technology for securing encrypted data exchange over the internet using digital certificates. PKI is developing as the cornerstone for internet security by offering the security features such as encryption, algorithms for secure communication, non-repudiation using digital signatures, authentication, etc. the main key elements of the PKI are digital certificates, certificate authority, registration authority and certificate database. Most of them are focused on public key infrastructure (PKI), elliptic curve cryptography (ECC), identity-based cryptography (IBC) [23], Diffie Hellman, Rivest-Shamir-Adelman (RSA), and Fully Homomorphic Encryption (FHE). However, due to low-performance capability and low computational power, many cryptographic techniques cannot be used for IoT devices [24]. So, this paper proposes a system with efficient privacy-preserving and public key authentication with confidentiality in IoT healthcare applications.