Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
New paradigms for access control in constrained environments
Hubert Curien Lab, France.
Hubert Curien Lab, France.
RISE., Swedish ICT, SICS.
Ericsson, Sweden.
Visa övriga samt affilieringar
2014 (Engelska)Ingår i: 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip, ReCoSoC 2014, IEEE Computer Society , 2014, artikel-id 6861362Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper addresses authentication and access control in the frame of the IoT. It presents Physical Unclonable Functions (PUF), which can provide cheap, secure, tamper-proof secret keys to authentify constrained M2M devices. To be successfully used in the IoT context, this technology needs to be embedded in a standardized identity and access management framework. On the other hand, Embedded Subscriber Identity Module (eSIM) can provide cellular connectivity with scalability, interoperability and standard compliant security protocols. The paper discusses an authorization scheme for a constrained resource server taking advantage of PUF and eSIM features. Concrete IoT uses cases are discussed (SCADA and building automation).

Ort, förlag, år, upplaga, sidor
IEEE Computer Society , 2014. artikel-id 6861362
Nyckelord [en]
Access control, Cryptography, Intelligent buildings, Interoperability, Scalability, Building automation, Cellular connectivity, Constrained resources, Identity and access managements, Internet of thing (IOT), Physical unclonable functions (PUF), Security and privacy, Subscriber identity module, Internet of things
Nationell ämneskategori
Teknik och teknologier
Identifikatorer
URN: urn:nbn:se:ri:diva-46458DOI: 10.1109/ReCoSoC.2014.6861362Scopus ID: 2-s2.0-84905671677ISBN: 9781479958108 (tryckt)OAI: oai:DiVA.org:ri-46458DiVA, id: diva2:1460774
Konferens
2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip, ReCoSoC 2014, 26 May 2014 through 28 May 2014, Montpellier
Tillgänglig från: 2020-08-25 Skapad: 2020-08-25 Senast uppdaterad: 2020-12-01Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopus
Av organisationen
SICS
Teknik och teknologier

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetricpoäng

doi
isbn
urn-nbn
Totalt: 21 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf