Extend and harden our current Java simulation for the Bio-Hybrid TESLA flow (key chain derivation, delayed disclosure, MAC verification, time windows, key commitment, and revocation handling).
Biometric binding:
Define how iris features/quality metrics bind to TESLA key schedules without leaking PII/templates; design privacy-preserving verification artifacts.
IoT integration:
Package the protocol for edge devices (e.g., mini-PC/industrial controller) interfacing with an
iris scanner
(e.g., CMITech EF-45 or similar) and site networks.
Secure storage & key management:
Keystore/TPM/HSM use on server/edge; nonce handling, replay protection, and secure audit logs.
Define secure APIs between React/Django back end, Java services, and MS SQL Server; ensure encrypted transit & at-rest data with clear key rotation plans.
Threat modeling & tests:
STRIDE-style analysis, unit/prop tests for cryptographic invariants, and red-team scripts for tamper/fuzz testing.
Documentation:
Developer-ready specs, message diagrams, and ops runbooks for deployment at construction sites.
Required qualifications
6+ years
in security engineering or applied cryptography for production systems.
Strong
Java
(security, concurrency, performance) and experience with at least one of:
Kotlin, Python, C/C++
for edge utilities.
Hands-on with
TESLA-like broadcast authentication
or time-based key disclosure schemes; comfort with
HKDF
,
HMAC-SHA-256
,
AES-GCM/ChaCha20-Poly1305
, and rolling key chains.
IoT/edge
security: device onboarding, attestation basics, secure boot, firmware signing, and field update strategies.