Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

We have addressed some of these issues in the past in industrial controls systems (with real time OS) and (telecom infrastructure) with PTP (precision time protocol). 

The National Cybersecurity Center of Excellence (NCCoE), in partnership with the National Strategy for Trusted Identities in Cyberspace National Program Office, is seeking comments on a new project focused on protecting privacy and security when reusing credentials at multiple online service providers. For example, your social media account login can be used to access your fitness tracker account. In effect, the social media company is vouching for you with the tracker company.

Perhaps there is an identity solution applicable to IoT already in development.  This approach uses blockchain and is funded by some major VCs.

...