Assigning IDs Within the Internet of Things >>

Published in: smt.iconnect007 online, January 16th, 2018


Networking devices and machinery is in full swing. However, despite all the Industry 4.0 enthusiasm, there are voices of caution: Secure your communication. For this, identification of the participants is one requirement and special SD cards offer a surprisingly simple and flexible solution—ready for post-quantum cryptography.


For IT security experts, the three steps that open a “secure channel” are obvious: identification, authentication and authorization. A two-step authentication process can significantly improve security. The token used for authentication can also be used for encrypting the communication content.


Please find the complete article of smt.iconnect007 online here.

>> more