2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM) 2013
DOI: 10.1109/wowmom.2013.6583465
|View full text |Cite
|
Sign up to set email alerts
|

Authorization framework for the Internet-of-Things

Abstract: This paper describes a framework that allows finegrained and flexible access control to connected devices with very limited processing power and memory. We propose a set of security and performance requirements for this setting and derive an authorization framework distributing processing costs between constrained devices and less constrained back-end servers while keeping message exchanges with the constrained devices at a minimum. As a proof of concept we present performance results from a prototype implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
66
0
2

Year Published

2015
2015
2020
2020

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(70 citation statements)
references
References 5 publications
0
66
0
2
Order By: Relevance
“…Further, this solution does not seamlessly support mobility, which is a major requirement of the future Internet and a desirable characteristic for IoT applications. Recently, several works [20][21][22][23][24][25] focus on establishing an authorization framework for IoT, and enable access control in the IoT. However, these piece-wise solutions do not provide a complete framework to address many practical issues facing IoT systems, such as identification, addressing, mobility, interoperability and scalability.…”
Section: Survey Of the Evolution Of Iot Architecturesmentioning
confidence: 99%
“…Further, this solution does not seamlessly support mobility, which is a major requirement of the future Internet and a desirable characteristic for IoT applications. Recently, several works [20][21][22][23][24][25] focus on establishing an authorization framework for IoT, and enable access control in the IoT. However, these piece-wise solutions do not provide a complete framework to address many practical issues facing IoT systems, such as identification, addressing, mobility, interoperability and scalability.…”
Section: Survey Of the Evolution Of Iot Architecturesmentioning
confidence: 99%
“…This proposal is based on a multishow credentials system, which is used by users to authenticate anonymously. In addition, in [27] provides an authorization framework based on SAML assertions that are obtained from decisions made by an engine based on XACML. These assertions are used to get access to an IoT device through the use of symmetric key cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Seitz et al [20] propose a framework with Authorization Engine as Trusted Third Party. It resolves authorization requests for constrained devices when user wants to access any of devices data or service.…”
Section: Related Workmentioning
confidence: 99%
“…They lack in terms of propagation of security rules across the network. An excellent research for general means of securing of the data in the IoT environment provides [13,20]. However, they do not address two significant use-casesdevice to device and device to user communication.…”
Section: Related Workmentioning
confidence: 99%