2016 Cloudification of the Internet of Things (CIoT) 2016
DOI: 10.1109/ciot.2016.7872911
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: The Internet of Things (IoT) has significant security and privacy risks. Currently, most devices connect to a cloud service that is provided by the manufacturer of the device.We outline a proposed model for IoT that allows the identity of users and devices to be federated. Users and devices are issued with secure, random, anonymised identities that are not shared with third-parties. We demonstrate how devices can be connected to third-party applications without inherently de-anonymising them. Sensor data and a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0
3

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(23 citation statements)
references
References 13 publications
0
20
0
3
Order By: Relevance
“…In Fremantle, Kopecký & Aziz (2015) there is a proposal for the use of the OAuth2 Dynamic Client Registration (Sakimura, Bradley & Jones, 2015) process to create unique keys/credentials for each device. In Fremantle & Aziz (2016) there is a well-defined and secure process for device and user registration that allows users to take control of devices in scenarios where the device itself offers no User Interface (UI) or a very basic UI.…”
Section: A4: Device Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…In Fremantle, Kopecký & Aziz (2015) there is a proposal for the use of the OAuth2 Dynamic Client Registration (Sakimura, Bradley & Jones, 2015) process to create unique keys/credentials for each device. In Fremantle & Aziz (2016) there is a well-defined and secure process for device and user registration that allows users to take control of devices in scenarios where the device itself offers no User Interface (UI) or a very basic UI.…”
Section: A4: Device Authenticationmentioning
confidence: 99%
“…Some systems offer models of taking ownership securely (e.g., Bluetooth, Near Field Communication (NFC)). In Fremantle & Aziz (2016), there is a system described where a QR code is used in conjunction with a Web-based system.…”
Section: User Spherementioning
confidence: 99%
See 1 more Smart Citation
“…In Tindall (2015), a model is proposed whereby devices can pay for updates using a blockchain-based cryptocurrency such as Bitcoin. In the (Fremantle and Aziz, 2016) there is an approach where IoT devices are updated based on the secure identity and consent models used in OAuth2.…”
Section: User Spherementioning
confidence: 99%
“…In Fremantle et al (2015) there is a proposal for the use of the OAuth2 Dynamic Client Registration (Sakimura et al, 2015) process to create unique keys/credentials for each device. In Fremantle and Aziz (2016) there is a well-defined and secure process for device and user registration that allows users to take control of devices in scenarios where the device itself offers no User Interface (UI) or a very basic UI.…”
Section: A4: Device Authenticationmentioning
confidence: 99%