Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $69.00
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $84.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

Scope

This standard defines a blockchain-based Zero-Trust framework addressing common security and trust issues in the Internet of Things (IoT). The framework provides an enforcement model constructed using a suite of blockchain-enabled logical security and trust service components in IoT systems. The standard defines an implementation model for use on device, edge, and cloud components along with an enforcement process and descriptions of typical deployment variations of the framework to provide systematic confidentiality, integrity, availability, and usability.

Purpose

This standard provides a reference framework to enforce and implement Zero-Trust access control for IoT systems using blockchain. It specifies a systematic mechanism of blockchain-enabled authentication, authorization, and data resource sharing in IoT systems to facilitate trusted, secure, and usable connectivity among people, things, and applications.

Abstract

New IEEE Standard - Active. The surging needs for the Internet of Things (IoT) are dramatically shifting the network structure and challenging the traditional perimeter security paradigm. To establish secure and trustworthy interoperability among billions of heterogeneous interconnected devices, there is a need for standards defining a common framework. In this standard, a blockchain-based Zero-Trust access control framework is defined. The framework provides a typical implementation model and deployment variations, addressing general security and trust in IoT applications with the inspiration of the emerging Zero-Trust paradigm and blockchain technology. The leverage of blockchain and Zero-Trust discussed could provide reliable interactions among people, things, and applications in the presence of failures and attacks, and improve an IoT system’s overall information technology security posture.