An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT

@article{Witkovski2014AnIA,
  title={An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT},
  author={Adriano Witkovski and Altair Olivo Santin and Vilmar Abreu and Jo{\~a}o Eugenio Marynowski},
  journal={2015 IEEE Global Communications Conference (GLOBECOM)},
  year={2014},
  pages={1-6}
}
Internet of Things (IoT) brings significant challenges to authentication schemes in a scenario with several appliances for a smart house that should be accessed by a technician for maintenance tasks, for instance. An Identity Management (IdM) can be applied to easily authenticate a technician that intend to access the appliances from the Internet. However, Internet context is significantly different from IoT, demanding context adaptation to work. Thus, integrate these contexts to allow the… 

Figures from this paper

An OpenID Based Authentication Service Mechanisms for Internet of Things

An authentication model based on OpenID for IoT manufacturer platform is proposed which will enable users to maintain IoT devices using single web identity and access control is managed by the manufacturer's application which reliefs resource constraint device from additional overhead.

A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications

This paper is positioned to give a review of some existing lightweight authentication schemes, guide the selection and design of best possible solutions that can be applied to smart home environments and recommend the least costly solution for adoption.

A Federated Lightweight Authentication Protocol for the Internet of Things

Federated Lightweight Authentication of Things (FLAT), the solution, replaces weighty protocols and asymmetric cryptographic primitives used in traditional FIdM by lighter ones and synergistically combines symmetric cryptosystems and Implicit Certificates.

A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT

This proposal includes multi-sensor anti-tampering techniques to provide physical protection to a smart meter and a multilevel integrity mechanism to provide logical protection to its resource-constrained microcontroller, given the smart meter is a key component to mitigate electricity consumption fraud.

A Survey on Authentication Techniques for the Internet of Things

A critical review of the prominent and recent authentication techniques for IoT objects is presented, followed by a discussion of the limitations of current authentication techniques and future research avenues and opportunities.

Survey on Identity and Access Management for Internet of Things

A comprehensive state-of-the-art survey of IAMs and the main concepts and challenges when applied to IoT is presented, giving its essential characteristics and communication architectures and its main applications.

An Overview of Potential Authentication Threats and Attacks on Internet of Things(IoT): A Focus on Smart Home Applications

  • Attlee M. GamundaniAmelia PhillipsH. Muyingi
  • Computer Science
    2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
  • 2018
The main ideas on the potential authentication threats and attacks on IoT in Smart home applications, presented in this paper are largely informed by the detailed literature review of related work in the domain of IoT.

Data Protection Mechanisms in IoT: A Vital Challenge

The schemes to guard IoT communications and the methods adopted by the researchers while providing security of data in IoT are analyzed to summarizes the issues with IoT device security and the efficiency of the existing security solutions.

Global identity management in the Internet of Things

This research proposes a new identification technique to facilitate the establishment of the actual requester’s (i.e. the EA) identity behind the communicated object by the SPs in the IoT.

References

SHOWING 1-10 OF 18 REFERENCES

Towards viable certificate-based authentication for the internet of things

It is argued that certificates - with improvements to the handshake - are a viable method of authentication in many network scenarios and three design ideas to reduce the overheads of the DTLS handshake are proposed.

IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios

An architecture targeting HTTP/CoAP services to provide an authorization framework, which can be integrated by invoking an external oauth-based authorization service (OAS), which is denoted as IoT-OAS is proposed.

Identity Management in the Internet of Things: the Role of MANETs for Healthcare Applications

This paper examines the underlying issues behind IDM and proposes a framework which aims to achieve the identification of Things and their safe management and aims to open a research debate which will help to solve the future IoT IDM issues in healthcare applications.

Federated Identity and Access Management for the Internet of Things

This work examines the use of Federated Identity and Access Management (FIAM) approaches for the Internet of Things (IoT) and builds a prototype that uses OAuth 2.0 to enable access control to information distributed via MQTT.

A federated architecture approach for Internet of Things security

The paper defines the security needs proposing a federated model to design an architecture for secure exchange of services in IoT paradigm and proposes an approach addressed to overcome the conventional security solutions and deploy a Federated architecture for dynamic prevention, detection, diagnosis, isolation, and countermeasures against cyber attacks.

A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications

The original Nyberg's fast one-way accumulator is revised and a lightweight multicast authentication mechanism for small scale IoT applications is constructed and the property of absorbency is discovered that makes it very suitable for applications in which accumulated items are dynamic.

A User Centric Identity Management for Internet of Things

A user centric identity management system that incorporates user identity, device identity and the relations between them is proposed and allows device authentication and authorization based on the user identity.

The internet of things: a survey

The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.

Authentication and Access Control in the Internet of Things

This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)

This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT, and Security Model for IoT has been proposed.