An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT

@article{Witkovski2014AnIA,
  title={An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT},
  author={Adriano Witkovski and Altair Olivo Santin and Vilmar Abreu and Jo{\~a}o Eugenio Marynowski},
  journal={2015 IEEE Global Communications Conference (GLOBECOM)},
  year={2014},
  pages={1-6}
}
Internet of Things (IoT) brings significant challenges to authentication schemes in a scenario with several appliances for a smart house that should be accessed by a technician for maintenance tasks, for instance. An Identity Management (IdM) can be applied to easily authenticate a technician that intend to access the appliances from the Internet. However, Internet context is significantly different from IoT, demanding context adaptation to work. Thus, integrate these contexts to allow the… 
A Smart Meter and Smart House Integrated to an IdM and Key-based Scheme for Providing Integral Security for a Smart Grid ICT
TLDR
This proposal includes multi-sensor anti-tampering techniques to provide physical protection to a smart meter and a multilevel integrity mechanism to provide logical protection to its resource-constrained microcontroller, given the smart meter is a key component to mitigate electricity consumption fraud.
A Survey on Authentication Techniques for the Internet of Things
TLDR
A critical review of the prominent and recent authentication techniques for IoT objects is presented, followed by a discussion of the limitations of current authentication techniques and future research avenues and opportunities.
Data Protection Mechanisms in IoT: A Vital Challenge
The Internet of Things (IoT) associated with life is a budding real-time environment paradigm. Smart Users can control and analyze Things through Smart gadgets connected through the network. As
FLAT: Federated lightweight authentication for the Internet of Things
TLDR
The results show that FLAT can reduce the data exchange overhead by around 31% when compared to a baseline solution, and the FLAT Client, the role played by an IoT device in the protocol, is more efficient than the baseline Client in terms of data exchange, storage, memory, and computation time.
Internet of Things (IoT) of Smart Home: Privacy and Security
TLDR
As IoT home devices become increasingly ubiquitous, study’s findings and recommendations contribute to the broader understanding of users’ evolving attitudes towards privacy in smart homes.
Escalation of Security and Privacy in Internet of Things using Advanced IPv6 Based Security Mechanism
TLDR
The work presents the implementation using high performance framework for the security in the IoT environment using security mechanism on IPv6, and presents simulation trends that can cover protection weakness of the Internet of Things.
Key-Based Cookie-Less Session Management Framework for Application Layer Security
TLDR
A comprehensive scheme that allows the unification of multiple security mechanisms, thereby removing the burden of authentication, mutual authentication, continuous authentication, and session management from the application development life-cycle is proposed.
Providing security and privacy in smart house through mobile cloud computing
TLDR
This paper aims to provide security and privacy by design in a smart house, isolating appliances from direct Internet access, while allowing external entities to reach power consumption features.
A review of smart home applications based on Internet of Things
TLDR
A review is conducted to map the research landscape of smart home based on Internet of Things into a coherent taxonomy and identifies the basic characteristics of this emerging field in the following aspects: motivation of using IoT in smart home applications, open challenges hindering utilization, and recommendations to improve the acceptance and use of smartHome IoT applications in literature.
Digital Forensic Investigation of Internet of Things (IoT) Devices
TLDR
This research collects features from a corpus of Android malware using both emulation and on-phone instrumentation and trains machine learning models using the emulator-based features and models on features collected via instrumentation, and compares the results obtained in these two cases.
...
1
2
...

References

SHOWING 1-10 OF 18 REFERENCES
Towards viable certificate-based authentication for the internet of things
TLDR
It is argued that certificates - with improvements to the handshake - are a viable method of authentication in many network scenarios and three design ideas to reduce the overheads of the DTLS handshake are proposed.
IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios
TLDR
An architecture targeting HTTP/CoAP services to provide an authorization framework, which can be integrated by invoking an external oauth-based authorization service (OAS), which is denoted as IoT-OAS is proposed.
Identity Management in the Internet of Things: the Role of MANETs for Healthcare Applications
TLDR
This paper examines the underlying issues behind IDM and proposes a framework which aims to achieve the identification of Things and their safe management and aims to open a research debate which will help to solve the future IoT IDM issues in healthcare applications.
Federated Identity and Access Management for the Internet of Things
TLDR
This work examines the use of Federated Identity and Access Management (FIAM) approaches for the Internet of Things (IoT) and builds a prototype that uses OAuth 2.0 to enable access control to information distributed via MQTT.
A federated architecture approach for Internet of Things security
TLDR
The paper defines the security needs proposing a federated model to design an architecture for secure exchange of services in IoT paradigm and proposes an approach addressed to overcome the conventional security solutions and deploy a Federated architecture for dynamic prevention, detection, diagnosis, isolation, and countermeasures against cyber attacks.
A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications
Security is very important for Internet of Things (IoTs). As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the
Authentication framework of IIEDNS based on LDAP & Kerberos
  • Ning Li, Qing Wang, Z. Deng
  • Computer Science
    2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)
  • 2010
TLDR
This framework provides an effective and secure scheme for the authentication on IIEDNS based on LDAP & Kerberos to meet the requirement of IOT and solved the issues of information efficiency and security of information sharing.
A User Centric Identity Management for Internet of Things
TLDR
A user centric identity management system that incorporates user identity, device identity and the relations between them is proposed and allows device authentication and authorization based on the user identity.
The internet of things: a survey
TLDR
The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Authentication and Access Control in the Internet of Things
  • Jing Liu, Yang Xiao, C. Chen
  • Computer Science
    2012 32nd International Conference on Distributed Computing Systems Workshops
  • 2012
TLDR
This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
...
1
2
...