Proceedings of the Second International Conference on Internet-of-Things Design and Implementation 2017
DOI: 10.1145/3054977.3054980
|View full text |Cite
|
Sign up to set email alerts
|

A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things

Abstract: The challenges posed by the Internet of Things (IoT) render existing security measures ineffective against emerging networks and devices. These challenges include heterogeneity, operation in open environments, and scalability. In this paper, we propose SST (Secure Swarm Toolkit), an open-source toolkit for construction and deployment of an authorization service infrastructure for the IoT. The infrastructure uses distributed local authorization entities, which provide authorization services that can address het… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 29 publications
0
20
0
Order By: Relevance
“…In particular, the attacker seeks to disrupt the availability of IoT devices connected to a gateway (e.g., an Auth) by carrying out various DoS attacks on it, such as flooding or distributed denial-of-service (DDoS) attacks. In our model, we primarily focus on DoS attacks and failures, instead of confidentiality or integrity attacks (addressed by our prior work on SST [Kim et al 2017b]).…”
Section: Threat Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…In particular, the attacker seeks to disrupt the availability of IoT devices connected to a gateway (e.g., an Auth) by carrying out various DoS attacks on it, such as flooding or distributed denial-of-service (DDoS) attacks. In our model, we primarily focus on DoS attacks and failures, instead of confidentiality or integrity attacks (addressed by our prior work on SST [Kim et al 2017b]).…”
Section: Threat Modelmentioning
confidence: 99%
“…In SST, each Auth has database tables to store authorization information of entities and trust relationships among Auths. As introduced in the SST paper [Kim et al 2017b], the four main database tables maintained by each Auth are Registered Entity Table, Communication Policy Table, Trusted Auth Table, and Cached Session Key Table. • Registered Entity Table stores Table, then the necessary communication policies should be backed up as well.…”
Section: Auth Databasementioning
confidence: 99%
See 2 more Smart Citations
“…Previously, we proposed an authorization infrastructure of the IoT called Secure Swarm Toolkit (SST) [8]. SST leverages a network architecture with special edge computers called Auths, which provide authorization services to local IoT devices.…”
Section: Introductionmentioning
confidence: 99%