AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle

@inproceedings{Neto2016AoTAA,
  title={AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle},
  author={Antonio L. Maia Neto and Artur L. F. Souza and {\'I}talo S. Cunha and Michele Nogueira Lima and Ivan Oliveira Nunes and Leonardo Cotta and Nicolas Gentille and Antonio Alfredo Ferreira Loureiro and Diego F. Aranha and Harsh Kupwade Patil and Leonardo B. Oliveira},
  booktitle={SenSys},
  year={2016}
}
The consumer electronics industry is witnessing a surge in Internet of Things (IoT) devices, ranging from mundane artifacts to complex biosensors connected across disparate networks. As the demand for IoT devices grows, the need for stronger authentication and access control mechanisms is greater than ever. Legacy authentication and access control mechanisms do not meet the growing needs of IoT. In particular, there is a dire need for a holistic authentication mechanism throughout the IoT… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 24 CITATIONS

SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques

  • 2018 IEEE Conference on Communications and Network Security (CNS)
  • 2018
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Authentication and Authorization for IoT Devices in Disadvantaged Environments

  • 2019 IEEE 5th World Forum on Internet of Things (WF-IoT)
  • 2019
VIEW 3 EXCERPTS
HIGHLY INFLUENCED

Device and User Management for Smart Homes

  • 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)
  • 2018
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

The computer for the 21st century: present security & privacy challenges

Leonardo B. Oliveira, Fernando Magno Quintão Pereira, +6 authors Jie Liu
  • J. Internet Services and Applications
  • 2018
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS

Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices

  • 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
  • 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 13 REFERENCES

Attributed based access control (ABAC) for Web services

  • IEEE International Conference on Web Services (ICWS'05)
  • 2005
VIEW 12 EXCERPTS
HIGHLY INFLUENTIAL

Computer Security: Art and Science

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Identity-Based Encryption

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Ciphertext-Policy Attribute-Based Encryption

  • 2007 IEEE Symposium on Security and Privacy (SP '07)
  • 2007
VIEW 17 EXCERPTS
HIGHLY INFLUENTIAL

Attribute-based encryption for fine-grained access control of encrypted data

  • ACM Conference on Computer and Communications Security
  • 2006
VIEW 19 EXCERPTS
HIGHLY INFLUENTIAL

Cryptography - theory and practice

  • Discrete mathematics and its applications series
  • 1995
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL