2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC) 2014
DOI: 10.1109/recosoc.2014.6861362
|View full text |Cite
|
Sign up to set email alerts
|

New paradigms for access control in constrained environments

Abstract: The Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper adresses … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 8 publications
(8 reference statements)
0
15
0
Order By: Relevance
“…There is much work on establishing secure communication channels between 'things' [31,37]; standards for this purpose are summarised in [46]. Others have designed access control schemes specifically for IoT [25,63], and some research focuses on lightweight authentication mechanisms [49,65,74].…”
Section: Current Iot Security Researchmentioning
confidence: 99%
“…There is much work on establishing secure communication channels between 'things' [31,37]; standards for this purpose are summarised in [46]. Others have designed access control schemes specifically for IoT [25,63], and some research focuses on lightweight authentication mechanisms [49,65,74].…”
Section: Current Iot Security Researchmentioning
confidence: 99%
“…Such concerns are orthogonal to our work, and could be leveraged to support lower-end device implementations. Others have designed access control schemes specifically for IoT [26], [27]. These focus on adapting existing techniques to resource constrained devices, rather than on developing new approaches towards the wider IoT requirements.…”
Section: Related Workmentioning
confidence: 99%
“…may be re-programmable. Thus, users may define policies and permissions for their own use, and protection mechanisms should provide interoperability, flexibility and scalability while remaining lightweight [9]. Physical unclonable functions (PUFs) are a promising way to ensure authentication, access control and traceability.…”
Section: Introductionmentioning
confidence: 99%
“…Physical unclonable functions (PUFs) are a promising way to ensure authentication, access control and traceability. PUFs provide secure and low-cost authentication [9], [4]. Many architectures have been proposed for PUFs in the related literature, and they can be divided into groups [10].…”
Section: Introductionmentioning
confidence: 99%