Bootstrapping Demonstration Video for pilot 1
MSK Generation
In modern secure communication protocols, bootstrapping plays an important role in MSK generation, ensuring that all devices in the network share a common secret for encryption purposes. CERTIFY shows here the generation between an Authentication, Authorization and Accounting (AAA) server and an Access-Accept Manager (AA Manager). It typically happens as part of an authentication and key management process which is a special form of continuous phase frequency shift keying, with the detection in the receiver being performed in two successive bit intervals.
MUD fetching and sharing
Manufacturerer Usage Description (MUD) is a standard that helps devices communicate their behavior and network requirements to network management systems. This framework involves interactions between the device, a Domain Manager and the MUD Manager which can be part of a network controller or a management interface. In conclusion, this process from CERTIFY, ensures that IoT devices operate securely and efficiently within their designated network environments. This has several benefits like Automation, which automates policy enforcement for IoT devices. Enhancement, which enhances network security by limiting unauthorized access and Provisioning, which provides visibility into device behavior and policy compliance.
Alert and Reconfiguration
Alert and Reconfiguration is a crucial part of cybersecurity, particularly in environments requiring robust security measures, such as enterprise networks. CERTIFY shows four key components that ensure network securty. The Attestation Agent verifies the integrity of devices, alerting for any discrepancies in their configurations. The Network Boostrapping Monitor oversees the secure integration of new devices, ensuring compliance with security policies and detecting anomalies during onboarding. The Device and Domain Manager does the managing and access controls while maintaining an updated invetory. Lastly, the Security Information and Event Management system (SIEM) collects and analyzes security data, detecting and generating compliance reports. Together, these components create a framework for continuous monitoring, rapid threat response, and policy compliance, strengthening the organization's overall seurity posture.
MSK transfer and Verifiable Credentials
This integration from CERTIFY enhances the security reliability of digital identity and data sharing. By leveraging these technologies, organisations can build a more trustworthy ecosystem for managing sensitive information while empowering users to control their own digital identities.