2016
DOI: 10.1007/978-3-319-45480-1_19
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Security Considerations in the Arrowhead Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…Furthermore, Arrowhead is already deployed in dozens of products, and proved its capabilities in another few dozen industrial demonstrations. We keep improving the framework in many aspects: integrated security by ticketing and certificate-based approaches [194], deployment support through advanced plant descriptions, inter-cloud service orchestration [195], and complex use-case demonstrations, including the multi-stakeholder electro-mobility domain.…”
Section: Internet Of Things Platforms and Applicationsmentioning
confidence: 42%
“…Furthermore, Arrowhead is already deployed in dozens of products, and proved its capabilities in another few dozen industrial demonstrations. We keep improving the framework in many aspects: integrated security by ticketing and certificate-based approaches [194], deployment support through advanced plant descriptions, inter-cloud service orchestration [195], and complex use-case demonstrations, including the multi-stakeholder electro-mobility domain.…”
Section: Internet Of Things Platforms and Applicationsmentioning
confidence: 42%
“…In the contract-based extension, we use specific constructs in the safety assertions to formally define the temporal constraints, and then take them into account during simulation and verification to validate the design. The service oriented architecture implemented using Arrowhead services uses certificates to generate security tokens [28], which are subsequently used to provide lightweight security to the actual communication. This approach is particularly effective in our vehicle platooning case study, since we perform the more time consuming actions early during platoon creation, to benefit later of a secure communication channel with low overhead.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…Both protocols have been tested in a cleartext (HTTP) and in a secured (HTTPS with Arrowhead tokens) manner as well. Authentication for the latter cases are provided by the X.509 certificate hierarchy of Arrowhead [28].…”
Section: Arrowhead Frameworkmentioning
confidence: 99%
“…10) Every SW-system requests Orchestration using the obtained endpoint for every connection it wants to establish, services it wants to consume. 11) The Orchestration system cross-checks with authorisation and an Arrowhead session access token [26] might be generated for every connection attempt during the orchestration process. When any of the SW-systems hosted on the device shuts down, the device contacts the DeviceRegistry system and requests a destroyal of the local-cloud-SW-keys.…”
Section: B On-boarding/bootstrapping Proceduresmentioning
confidence: 99%