Security methodology for the use of identity-based cryptography in support of Internet of things (IoT) services over telecommunication networks |
|
Recommendation ITU-T X.1365 provides a security methodology for the use of identity-based cryptography (IBC) public key technology in support of Internet of things (IoT) services over telecommunication networks, including mechanisms of identity management, key management architecture, key management operations and authentication.
Traditional certificate-based security methodology involves heavyweight key management operations including certificate issuance, querying and revocation. Such systems face great difficulty in keeping up with the increasing numbers of devices connected in IoT while maintaining adequate performance.
IBC technology is another security methodology that uses an entity’s identity as a public key. An essential feature of IoT is that everything has a unique identifier (ID). Using such IDs as public keys has the benefit of no certificates being required. Consequently, an IBC security solution utilizes simpler key management, enables distributed authorities to control their own devices and scales well to both a high number of endpoints and diverse devices. |
|
Citation: |
https://handle.itu.int/11.1002/1000/14089 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (2) X.1350-X.1369: Internet of things (IoT) security |
Approval date: |
2020-03-26 |
Provisional name: | X.ibc-iot |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1365 (03/2020)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|