{"id":14147,"date":"2020-08-28T14:07:38","date_gmt":"2020-08-28T13:07:38","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=14147"},"modified":"2020-08-31T08:33:56","modified_gmt":"2020-08-31T07:33:56","slug":"security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/","title":{"rendered":"&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2\/2)"},"content":{"rendered":"<p style=\"text-align: justify;\">In a\u00a0<a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/07\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2\/\">previous article<\/a>, we discovered how &#8220;Security Twins&#8221; could improve the security and trust of connected devices. In this new article we will now look at how the \u201cSecurity Twins\u201d can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: \u201cJitsuin Archivist\u201d.<\/p>\n<p>&nbsp;<\/p>\n<h2>What does \u201cJitsuin Archivist\u201d look like?<\/h2>\n<p style=\"text-align: justify;\">The start-up Jitsuin has developed a tool called &#8220;Jitsuin Archivist&#8221; based on Distributed Ledger Technology (DLT). The purpose of this tool is to know &#8220;Who did what to a Thing and When\u201d.<\/p>\n<p style=\"text-align: justify;\">As of today, 5 types of users can interact with the tool: Archivist Administrator, System Administrator, Maintenance Operator, Auditor, Custom (currently in beta version).<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14148 media-14148\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14148 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/1.png\" alt=\"\" width=\"1277\" height=\"275\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/1.png 1277w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/1-437x94.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/1-71x15.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/1-768x165.png 768w\" sizes=\"auto, (max-width: 1277px) 100vw, 1277px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 1 \u2013 The 5 user roles of \u201cJitsuin Archivist\u201d<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">On this tool the user has access to the &#8220;Security Twins&#8221; of the connected devices. Indeed, after logging in, the user accesses a dashboard through which he has a global view of all the connected devices linked to the tool. He can see relevant statistics related to his IoT deployment, such as the number of critical incidents, the activity of connected objects, etc.<\/p>\n<p style=\"text-align: justify;\">The user can also access the &#8220;Manage Assets&#8221; page where he will find a map with the location of all the connected objects linked to the tool and a list of them (where he can also see in more detail the events linked to a particular connected device).<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14150 media-14150\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14150 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/2.png\" alt=\"\" width=\"1339\" height=\"653\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/2.png 1339w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/2-392x191.png 392w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/2-71x35.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/2-768x375.png 768w\" sizes=\"auto, (max-width: 1339px) 100vw, 1339px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 2 &#8211; The different views of the tool &#8220;Jitsuin Archivist&#8221;: 1. dashboard with a global view, 2. all the objects and their location, 3. detailed view of an object, 4. all the actions of the object useful during security audits<\/p>\n<p>&nbsp;<\/p>\n<h2>The PoC: A House with a digital lock<\/h2>\n<p style=\"text-align: justify;\">Wavestone used Jitsuin&#8217;s tool to first address the issue of identity and access management in buildings in at the dawn of digital transformation and the to illustrate the usefulness of &#8220;Security Twins&#8221;.<\/p>\n<p style=\"text-align: justify;\">To do this Wavestone used the lego house &#8220;SmartHouse&#8221; :<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14152 media-14152\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14152 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/3.jpg\" alt=\"\" width=\"1085\" height=\"955\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/3.jpg 1085w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/3-217x191.jpg 217w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/3-44x39.jpg 44w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/3-768x676.jpg 768w\" sizes=\"auto, (max-width: 1085px) 100vw, 1085px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 3 \u2013 The \u201cSmartHouse\u201d<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Equipped with an RFID card reader, a Raspberry Pi microcontroller and a servomotor, the entrance door of the &#8220;SmartHouse&#8221; only opens to users who have an authorized access card. All actions related to opening, closing, granting of entry rights, etc. are recorded on &#8220;Jitsuin Archivist&#8221; (see figure 4).<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14154 media-14154\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14154 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/4.png\" alt=\"\" width=\"1037\" height=\"474\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/4.png 1037w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/4-418x191.png 418w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/4-71x32.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/4-768x351.png 768w\" sizes=\"auto, (max-width: 1037px) 100vw, 1037px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 4 \u2013 The functional diagram of the \u201cSmartHouse\u201d<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">In order to facilitate the interaction with the digital lock of the \u201cSmartHouse\u201d, a platform allowing the simulation of different operations made by different peopled involved in the life cycle of connected devices has been created using the Django web framework and Bootstrap. This platform allows, among other things, to:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Send security patches to the connected lock (using Azure IoTHub)<\/li>\n<li>Assign access rights to the \u201cSmartHouse\u201d<\/li>\n<li>View the history of access rights requests made and those awaiting validation, etc.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">This is what the platform looks like:<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14156 media-14156\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14156 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/5.png\" alt=\"\" width=\"1426\" height=\"729\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/5.png 1426w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/5-374x191.png 374w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/5-71x36.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/5-768x393.png 768w\" sizes=\"auto, (max-width: 1426px) 100vw, 1426px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 5 &#8211; SmartHouse&#8217;s management platform<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">The use of \u201cJitsuin Archivist\u201d in this PoC is very interesting when regards to security audits of connected devices. Indeed, as \u201cJitsuin Archivist\u201d is based on Distributed Ledger Technology (DLT), this system can be considered as &#8220;secure by design&#8221; since an auditor has a technical guarantee on the non-compromise of data (provided that the sending of this data is secure).<\/p>\n<p style=\"text-align: justify;\">Here is the &#8220;Auditor View&#8221; on \u201cJitsuin Archivist\u201d where it is possible to see all the information regarding the connected devices linked to the platform and to know who has done what to the connected device:<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14158 media-14158\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14158 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/6.png\" alt=\"\" width=\"1804\" height=\"884\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/6.png 1804w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/6-390x191.png 390w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/6-71x35.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/6-768x376.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/6-1536x753.png 1536w\" sizes=\"auto, (max-width: 1804px) 100vw, 1804px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 6 &#8211; The &#8220;Auditor View&#8221; of \u201cJitsuin Archivist\u201d<\/p>\n<p>&nbsp;<\/p>\n<h2>The PoC scenario: WaveHouse rents \u201cSmartHouses\u201d in France &#8230;<\/h2>\n<figure id=\"post-14160 media-14160\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14160 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/7.png\" alt=\"\" width=\"1246\" height=\"566\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/7.png 1246w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/7-420x191.png 420w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/7-71x32.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/7-768x349.png 768w\" sizes=\"auto, (max-width: 1246px) 100vw, 1246px\" \/><\/figure>\n<p>Here is the general architecture of the PoC:<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14162 media-14162\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14162 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/8.png\" alt=\"\" width=\"1326\" height=\"831\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/8.png 1326w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/8-305x191.png 305w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/8-62x39.png 62w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/8-768x481.png 768w\" sizes=\"auto, (max-width: 1326px) 100vw, 1326px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 7 &#8211; The general architecture of the PoC<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">As one can see, the digital lock (represented by the RFID card reader, the Raspberry Pi microcontroller and the servomotor) interacts with Azure IoTHub as well to facilitate the management of its firmware updates.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: justify;\">The main use cases studied by Wavestone and Jitsuin<\/h2>\n<p>The main use cases studied by Wavestone and Jitsuin are explained in the video below:<\/p>\n<div style=\"width: 640px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-14147-1\" width=\"640\" height=\"360\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/video-article-720p-mp4.mp4?_=1\" \/><a href=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/video-article-720p-mp4.mp4\">https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/video-article-720p-mp4.mp4<\/a><\/video><\/div>\n<p>&nbsp;<\/p>\n<h2>Conclusion<\/h2>\n<p style=\"text-align: justify;\">Wavestone and Jitsuin were able to demonstrate &#8211; with the different use cases illustrated above in the video &#8211; how to improve the security of connected devices:<\/p>\n<ul style=\"text-align: justify;\">\n<li>First of all, all of the people involved in the life cycle of the digital lock of the \u201cSmartHouse\u201d had access to its &#8220;Security Twin&#8221;. Indeed, each of them had access to a decentralized and unchangeable register provided by \u201cJitsuin Archivist\u201d with all the information regarding the security of the digital lock.<\/li>\n<li>Then, as mentioned above, this architecture is &#8220;secure by design&#8221; because as \u201cJitsuin Archivist\u201d is based on Distributed Ledger Technology (DLT), one has a technical guarantee on the non-compromising of data.<\/li>\n<li>The &#8220;Security Twin&#8221; of the digital lock ensured physical security since it had the rights management information, allowing all the people involved to know who had access to the &#8220;SmartHouse&#8221;.<\/li>\n<li>Finally, since the \u201cSecurity Twin\u201d also had firmware information, the different people involved could easily know which connected devices had vulnerabilities and quickly plan the distribution of security patches.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The &#8220;Security Twins&#8221; would therefore ultimately improve the security of the connected devices, since it would be easy to know which objects are secure and which are not.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a\u00a0previous article, we discovered how &#8220;Security Twins&#8221; could improve the security and trust of connected devices. In this new article we will now look at how the \u201cSecurity Twins\u201d can improve the security of physical accesses to a building&#8230;<\/p>\n","protected":false},"author":1379,"featured_media":13956,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3275],"tags":[3181,3622,3621,1750,3620],"coauthors":[3572,3578,813],"class_list":["post-14147","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-iot-consumer-goods-en","tag-iot-en","tag-jitsuin-en","tag-poc-en","tag-security-en","tag-smart-house"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Security Twins&quot;: A new security &amp; trust guarantee for connected devices (2\/2) - RiskInsight<\/title>\n<meta name=\"description\" content=\"In a previous article, we discovered how &quot;Security Twins&quot; could improve the security and trust of connected devices. In this new article we will now look at how the \u201cSecurity Twins\u201d can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: \u201cJitsuin Archivist\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Security Twins&quot;: A new security &amp; trust guarantee for connected devices (2\/2) - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"In a previous article, we discovered how &quot;Security Twins&quot; could improve the security and trust of connected devices. In this new article we will now look at how the \u201cSecurity Twins\u201d can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: \u201cJitsuin Archivist\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-28T13:07:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-31T07:33:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Raquel De Faria Cristas, Michel Girier, Cl\u00e9ment Leroy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raquel De Faria Cristas, Michel Girier, Cl\u00e9ment Leroy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/\"},\"author\":{\"name\":\"Raquel De Faria Cristas\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/90c0690f92031d5a3d98739e0b6faaea\"},\"headline\":\"&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2\/2)\",\"datePublished\":\"2020-08-28T13:07:38+00:00\",\"dateModified\":\"2020-08-31T07:33:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/\"},\"wordCount\":898,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg\",\"keywords\":[\"IoT\",\"Jitsuin\",\"POC\",\"security\",\"Smart House\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"IoT &amp; Consumer goods\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/\",\"name\":\"\\\"Security Twins\\\": A new security & trust guarantee for connected devices (2\/2) - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg\",\"datePublished\":\"2020-08-28T13:07:38+00:00\",\"dateModified\":\"2020-08-31T07:33:56+00:00\",\"description\":\"In a previous article, we discovered how \\\"Security Twins\\\" could improve the security and trust of connected devices. In this new article we will now look at how the \u201cSecurity Twins\u201d can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: \u201cJitsuin Archivist\u201d.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg\",\"width\":2560,\"height\":1280,\"caption\":\"Internet of Things flat iconic illustration thing object\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/90c0690f92031d5a3d98739e0b6faaea\",\"name\":\"Raquel De Faria Cristas\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/raquel-de-faria-cristas\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Security Twins\": A new security & trust guarantee for connected devices (2\/2) - RiskInsight","description":"In a previous article, we discovered how \"Security Twins\" could improve the security and trust of connected devices. In this new article we will now look at how the \u201cSecurity Twins\u201d can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: \u201cJitsuin Archivist\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/","og_locale":"en_US","og_type":"article","og_title":"\"Security Twins\": A new security & trust guarantee for connected devices (2\/2) - RiskInsight","og_description":"In a previous article, we discovered how \"Security Twins\" could improve the security and trust of connected devices. In this new article we will now look at how the \u201cSecurity Twins\u201d can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: \u201cJitsuin Archivist\u201d.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/","og_site_name":"RiskInsight","article_published_time":"2020-08-28T13:07:38+00:00","article_modified_time":"2020-08-31T07:33:56+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg","type":"image\/jpeg"}],"author":"Raquel De Faria Cristas, Michel Girier, Cl\u00e9ment Leroy","twitter_misc":{"Written by":"Raquel De Faria Cristas, Michel Girier, Cl\u00e9ment Leroy","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/"},"author":{"name":"Raquel De Faria Cristas","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/90c0690f92031d5a3d98739e0b6faaea"},"headline":"&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2\/2)","datePublished":"2020-08-28T13:07:38+00:00","dateModified":"2020-08-31T07:33:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/"},"wordCount":898,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg","keywords":["IoT","Jitsuin","POC","security","Smart House"],"articleSection":["Cybersecurity &amp; Digital Trust","IoT &amp; Consumer goods"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/","name":"\"Security Twins\": A new security & trust guarantee for connected devices (2\/2) - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg","datePublished":"2020-08-28T13:07:38+00:00","dateModified":"2020-08-31T07:33:56+00:00","description":"In a previous article, we discovered how \"Security Twins\" could improve the security and trust of connected devices. In this new article we will now look at how the \u201cSecurity Twins\u201d can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: \u201cJitsuin Archivist\u201d.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/07\/Fotolia_81590429_Subscription_Monthly_XXL-scaled.jpg","width":2560,"height":1280,"caption":"Internet of Things flat iconic illustration thing object"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/08\/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2\/2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/90c0690f92031d5a3d98739e0b6faaea","name":"Raquel De Faria Cristas","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/raquel-de-faria-cristas\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1379"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=14147"}],"version-history":[{"count":1,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14147\/revisions"}],"predecessor-version":[{"id":14164,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14147\/revisions\/14164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/13956"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=14147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=14147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=14147"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=14147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}