Author: Tyson Macaulay

Tyson Macaulay Tyson Macaulay is vice president of global telecommunications strategy at McAfee. Macaulay has extensive achievements in the telecommunications space, most recently as security liaison officer for the past 8 years at Bell Canada. He also supports the development of engineering and security standards through the Professional Engineers of Ontario, the International Standards Organization (ISO), the Internet Engineering Task Force (IETF), and the newly formed oneM2M.

Multi-party authentication and data protection Multi-party authentication and data protection can be expressed simply as  “2 +N”, meaning that “more than 2” entities are involved in a shared cryptosystem.  Additionally, this multi-party system can be  “horizontal” and “cascading”[1] The crux of these multi-party systems is that each participate “recreates” the keys common to the crypto-system […]

Weak or expensive: the old cryptosystem and techniques don’t scale to the IoT There are basically two models for authentication of Internet relationships, one is weak (shared key) and one is expensive (public key), and neither will address the full range of identity and access requirements in the IoT. SSL (Secure Sockets Layer) and TLS […]

In the Internet of Things (IoT) there will be far more “multi-party” transactions occurring than in the Internet of old, where most transactions were intrinsically  peer to peer.  For instance, today many transactions involve a client and a server, where the client authenticates to a server for an application or service being provided by the […]

The third meeting of the International Standards Organization’s (ISO) Special Working Group (SWG) on (Internet of Things) recently took place in Chongqing, China.  The purpose of the SWG is essentially to assess what has been done to date related to IoT standards and provide guidance to ISO about the ISO so that the existing standards […]

This is a follow-up discussion from my IoT blog entry on data quality on the Internet and ultimately in the Internet of Things (IoT).  In the last post, we pointed out that in the increasingly automated IoT, people often don’t know where their decision-support data has come from?  And what if it did not have […]