Overview of Device Access Control in the IoT and its Challenges

被引:9
作者
Beltran, V [1 ]
Skarmeta, A. F. [1 ]
机构
[1] Univ Murcia, Murcia, Spain
基金
欧盟地平线“2020”;
关键词
Application level - Architectural models - Building blockes - Decentralized approach - Device-to-Device communications - Security requirements;
D O I
10.1109/MCOM.2017.1700433
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Access control is a building block for the overall security of any communication system. When it comes to device-to-device communication, decentralized approaches for access control will allow governing a mass of devices in a scalable mode. Common understanding and standardization of application-level access control is also primordial for the incoming era of cooperating devices in the IoT. This article introduces different architectural models for decentralized device access control, their security requirements and implications.
引用
收藏
页码:154 / 160
页数:7
相关论文
共 12 条
[1]  
[Anonymous], 2014, PROCEEDING IEEE INT
[2]  
[Anonymous], 2015, NDN Technical Report NDN-0036
[3]  
[Anonymous], 2017, 8152 IETF RFC
[4]   CHARACTERIZATION OF WEB SINGLE SIGN-ON PROTOCOLS [J].
Beltran, Victoria .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 :24-30
[5]  
Burke Jeff, 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), P394, DOI 10.1109/INFCOMW.2013.6970725
[6]  
Eronen P., 4279 IETF RFC
[7]   KERBEROS - AN AUTHENTICATION SERVICE FOR COMPUTER-NETWORKS [J].
NEUMAN, BC ;
TSO, T .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :33-38
[8]  
Richer J., 2015, 7662 IETF RFC
[9]  
Seitz L., 7744 IETF RFC
[10]  
Seitz L., 2017, IETF INTERNET DRAFT