2014 IEEE 22nd International Conference on Network Protocols 2014
DOI: 10.1109/icnp.2014.104
|View full text |Cite
|
Sign up to set email alerts
|

Delegated Authenticated Authorization for Constrained Environments

Abstract: Smart objects are small devices with limited system resources, typically made to fulfill a single simple task. By connecting smart objects and thus forming an Internet of Things, the devices can interact with each other and their users and support a new range of applications.Due to the limitations of smart objects, common security mechanisms are not easily applicable. Small message sizes and the lack of processing power severely limit the devices' ability to perform cryptographic operations.This paper introduc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 15 publications
1
7
0
Order By: Relevance
“…Architecture layer in Objectives, Models, Architecture and Mechanism reference model. Note that this architecture is compatible with the one proposed in this work in progress by the IETF .…”
Section: Fairaccess's Om‐am Reference Modelsupporting
confidence: 52%
“…Architecture layer in Objectives, Models, Architecture and Mechanism reference model. Note that this architecture is compatible with the one proposed in this work in progress by the IETF .…”
Section: Fairaccess's Om‐am Reference Modelsupporting
confidence: 52%
“…Specifically, in step 1 the client requests resource access from the AS. The AS generates a random PoP key which it sends to the client 1 together with its encryption with the secret 1 The communication link between the client and the AS is secured, hence the PoP key cannot be obtained through eavesdropping.…”
Section: A Model #1: Linking Authorization Grants To Payments and Rementioning
confidence: 99%
“…Authorization for constrained IoT devices (Things), with limited connectivity and computation power, requires support from an authorization server (AS) [1]; relevant use cases range from authorization for home door locks and health monitoring devices to smart container tracking and industrial actuator control [2]. Offloading authorization functionality from IoT devices to an AS also facilitates the collective management of authorization policies.…”
Section: Introductionmentioning
confidence: 99%
“…Authorization and authentication are required for the safety of WoT. Figure 12 shows an overall authentication architecture which is proposed by [65]. Exclusively for constrained environments another authentication and authorization architecture, is proposed by [66].…”
Section: ) Authentication and Authorizationmentioning
confidence: 99%