IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios

被引:139
作者
Cirani, Simone [1 ]
Picone, Marco [1 ]
Gonizzi, Pietro [1 ]
Veltri, Luca [1 ]
Ferrari, Gianluigi [1 ]
机构
[1] Univ Parma, Dept Informat Engn, I-43124 Parma, Italy
关键词
Internet of Things; security; authorization; communication protocols; AUTHENTICATION;
D O I
10.1109/JSEN.2014.2361406
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Open authorization (OAuth) is an open protocol, which allows secure authorization in a simple and standardized way from third-party applications accessing online services, based on the representational state transfer (REST) web architecture. OAuth has been designed to provide an authorization layer, typically on top of a secure transport layer such as HTTPS. The Internet of Things (IoTs) refers to the interconnection of billions of resource-constrained devices, denoted as smart objects, in an Internet-like structure. Smart objects have limited processing/memory capabilities and operate in challenging environments, such as low-power and lossy networks. IP has been foreseen as the standard communication protocol for smart object interoperability. The Internet engineering task force constrained RESTful environments working group has defined the constrained application protocol (CoAP) as a generic web protocol for RESTful-constrained environments, targeting machine-to-machine applications, which maps to HTTP for integration with the existing web. In this paper, we propose an architecture targeting HTTP/CoAP services to provide an authorization framework, which can be integrated by invoking an external oauth-based authorization service (OAS). The overall architecture is denoted as IoT-OAS. We also present an overview of significant IoT application scenarios. The IoT-OAS architecture is meant to be flexible, highly configurable, and easy to integrate with existing services. Among the advantages achieved by delegating the authorization functionality, IoT scenarios benefit by: 1) lower processing load with respect to solutions, where access control is implemented on the smart object; 2) fine-grained (remote) customization of access policies; and 3) scalability, without the need to operate directly on the device.
引用
收藏
页码:1224 / 1234
页数:11
相关论文
共 35 条
[1]  
Aboba B., EXTENSIBLE AUTHENTIC
[2]  
[Anonymous], SECURITY CO IN PRESS
[3]  
[Anonymous], 2011, T201105 SWED I COMP
[4]  
[Anonymous], 2104 RFC INT ENG TAS
[5]  
[Anonymous], 2011, 2011 INT C DISTR COM
[6]  
[Anonymous], 2011, SUBMISSION NIST ROUN
[7]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[8]  
Bogdanov A, 2008, LECT NOTES COMPUT SC, V5154, P283
[9]   Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview [J].
Cirani, Simone ;
Ferrari, Gianluigi ;
Veltri, Luca .
ALGORITHMS, 2013, 6 (02) :197-226
[10]  
Dierks T., 2008, RFC 5246: The transport layer security (TLS) protocol version 1.2