Mutual authentication of Cinderella and a shoe
Created with Microsoft Designer

Mutual authentication of Cinderella and a shoe

Once upon a time, in a faraway kingdom, not subject to EC eIDAS regulations, there lived a young girl named Cinderella. Her mother had passed away, leaving her alone with her selfish stepmother that had two daughters of her own. We will skip how cruel they were to Cinderella and that part when prince invites every girl in the kingdom (scalability issue?) to a grand ball at the palace.

Fairy godmother helped Cinderella to acquire false identity, together with onboarding of untrusted objects, such as a carriage, a wonderful dress and delicate glass shoes. They were untrusted objects since a piece of malware with delayed execution (triggered at midnight) turned them into pumpkin, made them disappear, and did other sorts of nasty things.

In the log file of a grand ball, it was recorder that the prince was charmed by her beauty, that they danced together, that she fled from the palace, but also that one of her glass shoes slipped off her foot.

Now comes an interesting part: the prince was determined to find the owner of the glass shoe by using physically unclonable function (PUF) of that glass object, supposing that it could fit only the foot of mysterious girl. ?Other girls’ feet, including her stepsisters, simply couldn't squeeze in (unique biometric feature?).

But wait…what if the glass shoe was swapped by someone, changed for another glass shoe that fits to her ugly stepsister foot? This is why the authentication of objects and things is so important!!! Do not trust, verify…and do so as often as you can.

Protecting the identity of objects is one of the objectives of European research project ARCADIAN-IoT. Recently project published a press release informing that it has developed robust cybersecurity features to safeguard objects (otherwise known as “things”) and internet of things (IoT) ecosystems. In the project, solution called IoT-uSelf was developed by Atos and includes creation, issuing and verifying credentials for “things”. The framework developed in ARCADIA-IoT contain tools that allow any individuals, including prince charming, not only to identify and authenticate objects but also to easily monitor the security of any device or “thing”. ?More details can be found at https://www.arcadian-iot.eu/

We all know that Cinderella was reunited with the prince, and they lived happily ever after, but it was “once upon a time”. These days they would probably rely on tools and technologies like those from ARCADIAN-IoT, in keeping with the spirit of the times.

Gordan P.

SUPPORTING STUDENT PROTESTS IN SERBIA!

7 个月

Very well spotted analogies Aljosa Pasic! Even if on the end sounds like an advertisement for ARCADIAN-IoT ??

回复
Lydia Montandon

Persons-oriented Innovation, Experience & Accessibility

8 个月

Aljosa Pasic as always the king of illustrative metaphores :-) I love this adapted fairy tale!

回复
Elsa Prieto

Sales Consultant

8 个月

This is brilliant ????????

回复

要查看或添加评论,请登录

Aljosa Pasic的更多文章

  • Security Classification of IoT Devices

    Security Classification of IoT Devices

    When classifying IoT devices and IoT hardware from a security perspective, there are different taxonomies or frameworks…

  • Cybersecurity Fairy Tale

    Cybersecurity Fairy Tale

    Cybersecurity awareness and education should start with the primary school!!! Some 10 years ago this was the typical…

    2 条评论
  • AI based anomaly detection for decentralised Electrical Power and Energy Systems

    AI based anomaly detection for decentralised Electrical Power and Energy Systems

    On Novemeber 10th 2022, SDN-microSENSE project held Virtual Open Event where the latest results and outcomes of…

  • Lessons from Descartes, part 3: hardware and software dualism

    Lessons from Descartes, part 3: hardware and software dualism

    (You might want to read part 1 and part 2 before this article, although these are not related directly). Unfortunately,…

    1 条评论
  • Lessons from Descartes, part 2: technology and market dichotomy

    Lessons from Descartes, part 2: technology and market dichotomy

    The coordinate system, as we know it today, is called the Cartesian system, after the French mathematician René…

  • Future of Cybersecurity Education in Europe

    Future of Cybersecurity Education in Europe

    Recently I was listening to recording of Sir Ken Robinson, a professor, advisor, author, and speaker on education…

    1 条评论
  • Smart Cybersecurity?

    Smart Cybersecurity?

    The prefix “cyber” has been used in many terms like cybercrime, cyberterrorism and cyberwarfare, although often with…

    1 条评论
  • Efficient R&D in collaborative projects

    Efficient R&D in collaborative projects

    When it comes to efficient technology transfer from R&D to company portfolio, change is the only constant. In Atos…

  • NGI Talk: Cybersecurity for teleworking

    NGI Talk: Cybersecurity for teleworking

    Every day we must make decisions about hundreds of different risks. Whether it is crossing the street, washing your…

  • ENSURESEC project

    ENSURESEC project

    We do not hear much about specific e-commerce threats, apart from common site and transaction security, and maybe…

社区洞察

其他会员也浏览了