Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
New Paradigms for Authorization and Access Control in Constrained Environnements
RISE, Swedish ICT, SICS. SEC.
Show others and affiliations
Number of Authors: 5
2014 (English)Conference paper, (Refereed)
Abstract [en]

The Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper adresses authentication, authorization and access control in the frame of the IoT. It describes two technologies which, used in conjunction, provide all the credentials for secure authorization and access control in wireless constrained hardware systems with scalability and interoperability requirements. Physical Unclonable Functions (PUF) are lightweight cryptographic primitives that can be easily embedded in reconfigurable hardware. They provide secure, low-cost authentication means for constrained devices. Embedded Subscriber Identity Module (eSIM) provide cellular connectivity with scalability, interoperability and standard compliant security protocols. An authorization scheme involving a client, an authorization server and a constrained resource server is proposed based on PUF and eSIM features. Concrete IoT uses cases are discussed (SCADA and building automation).

Place, publisher, year, edition, pages
2014, 8.
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:ri:diva-24360OAI: oai:DiVA.org:ri-24360DiVA: diva2:1043441
Conference
9th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC 2014)
Available from: 2016-10-31 Created: 2016-10-31Bibliographically approved

Open Access in DiVA

No full text

Other links

http

Search in DiVA

By author/editor
Cherkaoui, AbdelkarimSelander, GöranBorgaonkar, Ravi
By organisation
SICS
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

Total: 9 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
v. 2.26.0