1、Amazon Sidewalk Privacy and Security Whitepaper 1 Contents Introduction . 2 Overview . 3 Amazon Sidewalk Privacy. 3 Data Minimization . 4 Encryption . 5 Trusted Device Identities . 5 Amazon Sidewalk Security . 5 Device Registration and Deriving the Transmission ID (TX-ID) . 5 Packet from the Endpoin
2、t to the Application Server (Cloud) . 7 Packet from the Application Server (Cloud) to the Endpoint . 8 Conclusion . 10 Appendix . 11 Security only the intended destinations (the endpoint and application server) Amazon Sidewalk Privacy and Security Whitepaper 4 possess the keys required to access thi
3、s information. Sidewalks design also ensures that owners of Sidewalk gateways do not have access to the contents of the packet from endpoints (they do not own) that use their bandwidth. Similarly, endpoint owners do not have access to gateway information. The Sidewalk Network Server continuously “ro
4、lls”, or changes transmission IDs (TX-ID) and Sidewalk Gateway IDs every 15 minutes to prevent tracking devices and associating a device to a specific user. Data Minimization Sidewalk minimizes the use of metadata wherever possible. Sidewalk uses the metadata needed to route packets from (to) the en
5、dpoint to (from) the Sidewalk gateway, and then to (from) the Application Server. For example, when a packet is sent from the endpoint to the Application Server, the Sidewalk Network Server needs to know: Endpoint Sidewalk-ID to authenticate the Sidewalk-compatible device Endpoint Payload Size to en
6、sure the packet meets bandwidth limitations Transmission Time to apply the correct rolling transmission ID Gateway ID to select the appropriate gateway (GW) needed to relay the packet Application Server to route the packet from the endpoint to its respective cloud The Sidewalk Network Server (SNS) d