Committed to connecting the world

  •  
wtisd

ITU-T Recommendations

Search by number:
Others:
Skip Navigation Links
Content search
Advanced search
Provisional name
Equivalent number
Formal description
Study Groups tree viewExpand Study Groups tree view

ITU-T X.1365 (03/2020)

عربي | 中文 | English | Español | Français | Русский
Security methodology for the use of identity-based cryptography in support of Internet of things (IoT) services over telecommunication networks
Recommendation ITU-T X.1365 provides a security methodology for the use of identity-based cryptography (IBC) public key technology in support of Internet of things (IoT) services over telecommunication networks, including mechanisms of identity management, key management architecture, key management operations and authentication.
Traditional certificate-based security methodology involves heavyweight key management operations including certificate issuance, querying and revocation. Such systems face great difficulty in keeping up with the increasing numbers of devices connected in IoT while maintaining adequate performance.
IBC technology is another security methodology that uses an entity’s identity as a public key. An essential feature of IoT is that everything has a unique identifier (ID). Using such IDs as public keys has the benefit of no certificates being required. Consequently, an IBC security solution utilizes simpler key management, enables distributed authorities to control their own devices and scales well to both a high number of endpoints and diverse devices.
Citation: https://handle.itu.int/11.1002/1000/14089
Series title: X series: Data networks, open system communications and security
  X.1300-X.1499: Secure applications and services (2)
  X.1350-X.1369: Internet of things (IoT) security
Approval date: 2020-03-26
Provisional name:X.ibc-iot
Approval process:TAP
Status: In force
Maintenance responsibility: ITU-T Study Group 17
Further details: Patent statement(s)
Development history