A cloud based conceptual identity management model for secured Internet of Things operation

被引:0
作者
Bello A. [1 ]
Mahadevan V. [2 ]
机构
[1] Western Sydney University, Penrith, 2751, NSW
[2] Melbourne Institute of Technology, Melbourne, 3000, VIC
来源
Journal of Cyber Security and Mobility | 2019年 / 8卷 / 01期
关键词
Cloud IoT; Identity Management; Identity of Things; Internet of Things; IoT Security;
D O I
10.13052/jcsm2245-1439.813
中图分类号
学科分类号
摘要
An era ago, projecting artificial intelligence as the pillar of next-generation technology would have been technically difficult. Today, machines are getting smarter, sparking a new wave of technology that resulted to Internet of Things (IoT). With IoT in play, individuals are able to connect more electronic devices other than smartphones and computers to the Internet. The vision is to create the possibility to manage electronic appliances via the Internet with the most minimal human intervention. IoT promises the application of computing to anything anywhere, and anyone at any time. Thus, it has been estimated that over 100 billion devices will be running the IoT model - drawing the power of cloud processing to create a massive network of devices that are bound to change the essential facets of life in various dimensions. However, several obstacles remain to fulfill this vision, among them is security concerns from an Identity of Things (IDoT) management perspective. IoT devices and users are already under cyber attacks, and any lapse in identity management will propagate these attacks. This paper examined how identity management for IoT is likely to play out in a world where the Internet and cloud technologies are expected to take center stage in the running of day-to-day activities. The paper analyses the identity of things challenges in IoT, followed by a proposal of cloud identity management model for IoT. © 2018 the Author(s).
引用
收藏
页码:53 / 74
页数:21
相关论文
共 62 条
  • [1] Atzori L., Iera A., Morabito G., The internet of things: A survey, Computer networks, 54, 15, pp. 2787-2805, (2010)
  • [2] Aijaz A., Aghvami A.H., Cognitive machine-to-machine communications for Internet-of-Things: A protocol stack perspective, IEEE Internet of Things Journal, 2, 2, pp. 103-112, (2015)
  • [3] Holler J., Boyle D., Tsiatsis V., Mulligan C., Karnouskos S., From Machine-to-machine to the Internet of Things: Introduction to a New Age of Intelligence, (2014)
  • [4] O'Neill M., Insecurity by design: Today's IoT device security problem, Engineering, 2, 1, pp. 48-49, (2016)
  • [5] Lee J.H., Kim H., Security and privacy challenges in the internet of things [security and privacy matters], IEEE Consumer Electronics Magazine, 6, 3, pp. 134-136, (2017)
  • [6] Morgan J., A simple explanation of 'The Internet of Things', (2014)
  • [7] Granjal J., Monteiro E., Silva J.S., Enabling networklayer security on IPv6 wireless sensor networks, 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), pp. 1-6, (2010)
  • [8] Batool K., Niazi M.A., Modeling the internet of things: a hybrid modeling approach using complex networks and agent-based models, Complex Adaptive Systems Modeling, 5, 1, (2017)
  • [9] Al-Fuqaha A., Guizani M., Mohammadi M., Aledhari M., Ayyash M., Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, 17, 4, pp. 2347-2376, (2015)
  • [10] Lee J.Y., Lin W.C., Huang Y.H., A lightweight authentication protocol for internet of things, 2014 International Symposium on Next-Generation Electronics (ISNE), pp. 1-2, (2014)