The pace of usage of personal devices has increased within industry, driving demand for trusted d... more The pace of usage of personal devices has increased within industry, driving demand for trusted digital identities. As the world becomes increasingly mobile with the number of smartphone users growing yearly and the mobile web thriving, it is critical to implement strong security on mobile devices. As passwords are not a secure method of authentication, mobile devices and other forms of IoT require a means of two-factor authentication that meets strong security standards. The research presented in this paper provides a framework that updates the existing Public Key Infrastructure (PKI) in use by industry and governments today to accommodate the use of digital identities on smartphones, tablets, or even a smartwatch.
The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PK... more The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digital identity for secure online voting. The paper goes on to discuss how blockchain-based PKI, NFC, and the cloud provide a roadmap for how industry and governments can update existing frameworks to obtain a trusted digital identity in cyberspace that would provide secure telework and online voting capabilities.
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2020
The pace of usage of personal devices has increased within industry, driving demand for trusted d... more The pace of usage of personal devices has increased within industry, driving demand for trusted digital identities. As the world becomes increasingly mobile with the number of smartphone users growing yearly and the mobile web thriving, it is critical to implement strong security on mobile devices. As passwords are not a secure method of authentication, mobile devices and other forms of IoT require a means of two-factor authentication that meets strong security standards. The research presented in this paper provides a framework that updates the existing Public Key Infrastructure (PKI) in use by industry and governments today to accommodate the use of digital identities on smartphones, tablets, or even a smartwatch.
The pace of usage of personal devices has increased within industry, driving demand for trusted d... more The pace of usage of personal devices has increased within industry, driving demand for trusted digital identities. As the world becomes increasingly mobile with the number of smartphone users growing yearly and the mobile web thriving, it is critical to implement strong security on mobile devices. As passwords are not a secure method of authentication, mobile devices and other forms of IoT require a means of two-factor authentication that meets strong security standards. The research presented in this paper provides a framework that updates the existing Public Key Infrastructure (PKI) in use by industry and governments today to accommodate the use of digital identities on smartphones, tablets, or even a smartwatch.
The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PK... more The novelty of this work lies in examining how 5G, blockchain-based public key infrastructure (PKI), near field communication (NFC), and zero trust architecture securely provide not only a trusted digital identity for telework but also a trusted digital identity for secure online voting. The paper goes on to discuss how blockchain-based PKI, NFC, and the cloud provide a roadmap for how industry and governments can update existing frameworks to obtain a trusted digital identity in cyberspace that would provide secure telework and online voting capabilities.
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2020
The pace of usage of personal devices has increased within industry, driving demand for trusted d... more The pace of usage of personal devices has increased within industry, driving demand for trusted digital identities. As the world becomes increasingly mobile with the number of smartphone users growing yearly and the mobile web thriving, it is critical to implement strong security on mobile devices. As passwords are not a secure method of authentication, mobile devices and other forms of IoT require a means of two-factor authentication that meets strong security standards. The research presented in this paper provides a framework that updates the existing Public Key Infrastructure (PKI) in use by industry and governments today to accommodate the use of digital identities on smartphones, tablets, or even a smartwatch.
Uploads