Committed to connecting the world

  •  
wtisd

ITU-T work programme

[2017-2020] : [SG17] : [Q6/17]

[Declared patent(s)]  - [Publication]

Work item: X.1365 (ex X.ibc-iot)
Subject/title: Security methodology for use of identity-based cryptography in support of Internet of Things (IoT) services over telecommunication networks
Status: Approved on 2020-03-26 
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: -
Liaison: -
Supporting members: -
Summary: Traditional certificate-based security methodology involves heavyweight key management operations including certificate issue, querying and revocation. Such systems face great difficulty in keeping up with the increasing numbers of devices connected to Internet of things (IoT) while maintaining decent performance. Identity-based cryptography (IBC) technology is another security methodology that uses an entity's identity as a public key. An essential feature of IoT is that everything has a unique identifier (ID). Using such IDs as public keys, no certificates are required. Consequently, an IBC security solution utilizes simpler key management, enables distributed authorities to control their own devices and scales well to both a high number of endpoints and diverse devices. This Recommendation provides a security methodology for the use of IBC public key technology in support of IoT services over telecommunications networks including mechanisms of identity management, key management architecture, key management operations and authentication.
Comment: -
Reference(s):
[R 43 ]
  Historic references:
Contact(s):
Zhaohui Cheng, Editor
Yu Jiang, Editor
Zhaoji Lin, Editor
Haiguang Wang, Editor
Yixiang Zhu, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2017-10-16 18:03:10
Last update: 2020-04-16 16:37:35