An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT

@article{Witkovski2014AnIA,
  title={An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT},
  author={A. Witkovski and A. Santin and V. Abreu and J. Marynowski},
  journal={2015 IEEE Global Communications Conference (GLOBECOM)},
  year={2014},
  pages={1-6}
}
  • A. Witkovski, A. Santin, +1 author J. Marynowski
  • Published 2014
  • Computer Science
  • 2015 IEEE Global Communications Conference (GLOBECOM)
  • Internet of Things (IoT) brings significant challenges to authentication schemes in a scenario with several appliances for a smart house that should be accessed by a technician for maintenance tasks, for instance. An Identity Management (IdM) can be applied to easily authenticate a technician that intend to access the appliances from the Internet. However, Internet context is significantly different from IoT, demanding context adaptation to work. Thus, integrate these contexts to allow the… CONTINUE READING
    7 Citations
    A Survey on Authentication Techniques for the Internet of Things
    • 39
    Key-Based Cookie-Less Session Management Framework for Application Layer Security
    • 2
    • PDF
    A review of smart home applications based on Internet of Things
    • 188
    • PDF
    A Literature Review: Big DATA Privacy and Security
    • 1
    • PDF

    References

    SHOWING 1-10 OF 16 REFERENCES
    Towards viable certificate-based authentication for the internet of things
    • 106
    • PDF
    IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios
    • 172
    • PDF
    Identity Management in the Internet of Things: the Role of MANETs for Healthcare Applications
    • 19
    Federated Identity and Access Management for the Internet of Things
    • 84
    • PDF
    A federated architecture approach for Internet of Things security
    • 83
    A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications
    • 103
    • PDF
    Authentication framework of IIEDNS based on LDAP & Kerberos
    • N. Li, Q. Wang, Z. Deng
    • Computer Science
    • 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)
    • 2010
    • 2
    A User Centric Identity Management for Internet of Things
    • 19
    Authentication and Access Control in the Internet of Things
    • Jing Liu, Y. Xiao, C. Chen
    • Computer Science
    • 2012 32nd International Conference on Distributed Computing Systems Workshops
    • 2012
    • 186
    The Internet of Things: A survey
    • 6,908
    • PDF