
Fully Decentralised, Post-Quantum Secure Networks
Author(s) -
Wayne Henderso
Publication year - 2022
Publication title -
international journal of mathematics and computer research
Language(s) - English
Resource type - Journals
ISSN - 2320-7167
DOI - 10.47191/ijmcr/v10i4.01
Subject(s) - computer security , interoperability , computer science , authentication (law) , encryption , edge device , enhanced data rates for gsm evolution , exploit , the internet , telecommunications , cloud computing , operating system
The Fourth Industrial Revolution, Industry 4.0, promises trillions of dollars of value creation by connecting billions of sensors and actuators to analytical engines, thereby creating the Industrial Internet of Things (IIoT). This revolution will push decision making to the edge and connect the edge to the center. The revolution faces three major technical challenges: interoperability between devices, security of edge devices and legacy infrastructure. This paper describes an implementation of a fundamentally new authentication and encryption technology (“dOISP™), that allows devices to connect regardless of operating system and transport technology. With dOISP™ a network manages its own security without use of certificates or Trusted Third Parties or any centralized or externalized source of trust and without human intervention – the network itself maintains a distributed source of trust that changes continuously and always assumes that authentication must be refreshed for every session. This technology enables the acceleration of Industry 4.0 initiatives thereby increasing their net present value as well as reducing the organizational costs of network security and reducing the risk of successful attack.