2019
DOI: 10.1007/978-981-15-0829-5_48
|View full text |Cite
|
Sign up to set email alerts
|

Identity Management in Internet of Things: A Software-Defined Networking Approach

Abstract: Internet of things (IoT) network needs to accommodate billions of connected smart objects (things). Connected IoT objects should be able to communicate with each other. Objects should be able to travel between different networks regardless of their locations, network providers, and manufacturers. To allow transparent movement of IoT objects it is very important to have a trust relationship between these objects. To establish trusted relationship, unique identity is one of the key properties for any IoT object.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…However, once it is employed in Cloud technology, we still consider it mobile. In fact, mobility is so vital that some works, like z [95,99], have this mobility as the main factor when developing their proposal and utilizes it for its own good. It is important to point out that the work [23] utilizes the self-sovereign model, but once it only creates a local DLT unable to interact with the wold, we consider it immobile.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…However, once it is employed in Cloud technology, we still consider it mobile. In fact, mobility is so vital that some works, like z [95,99], have this mobility as the main factor when developing their proposal and utilizes it for its own good. It is important to point out that the work [23] utilizes the self-sovereign model, but once it only creates a local DLT unable to interact with the wold, we consider it immobile.…”
Section: Discussionmentioning
confidence: 99%
“…To offer a proper answer to flexibility problems, the works [111,112], for example, alleges that cloud has limited flexibility to support IAMs and point out fog computing as the solution of the flexibility and the latency problem originated by the cloud. In [99], the author utilizes fog devices of different platforms to perform the authentication and authorization, which can significantly reduce the delay of those functions and the flexibility of the IAM as a whole. Lastly, when we observe DLT-based IAMs [107,23,108], it still in the early stages, with several workings being published recently.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…After the authentication process, the authorization takes place. The identity management of heterogeneous devices is still an open challenge [ 1 , 8 , 11 , 12 ]. Motivated by this we have proposed a novel model for identity management of the internet of things (IoT) devices.…”
Section: Background and Motivationmentioning
confidence: 99%