Fixing User Authentication for the Internet of Things (IoT)Integrating FIDO and OAuth into IoT

被引:0
|
作者
Hannes Tschofenig
机构
关键词
D O I
10.1007/s11623-016-0582-1
中图分类号
学科分类号
摘要
Over the last few years Internet of Things products have become known for their weak security. News articles regularly describe security vulnerabilities of cars, surveillance cameras, kettles, and other IoT devices. There are, however, recent standardization activities addressing some of these security challenges. This article describes how the work of the IETF and the FIDO Alliance can lead to improved security.
引用
收藏
页码:222 / 224
页数:2
相关论文
共 50 条
  • [1] AN AUTHENTICATION TECHNIQUE BASED ON OAUTH 2.0 PROTOCOL FOR INTERNET OF THINGS (IOT) NETWORK
    Khan, Jalaluddin
    Li, Jian Ping
    Ali, Ikram
    Parveen, Shadma
    Khan, Ghufran Ahmad
    Khalil, Mudassir
    Khan, Asif
    Ul Haq, Amin
    Shahid, Mohammad
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 160 - 165
  • [2] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    SENSORS, 2019, 19 (05)
  • [3] Analysis of Authentication Techniques in Internet of Things (IoT)
    El-hajj, Mohammed
    Chamoun, Maroun
    Fadlallah, Ahmad
    Serhrouchni, Ahmed
    2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [4] Taxonomy of Authentication Techniques in Internet of Things (IoT)
    El-hajj, Mohammed
    Chamoun, Maroun
    Fadlallah, Ahmad
    Serhrouchni, Ahmed
    PROCEEDINGS OF THE 2017 IEEE 15TH STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2017, : 67 - 71
  • [5] User Perceptions of Internet of Things (IoT) Systems
    Economides, Anastasios A.
    E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 3 - 20
  • [6] An OAuth based Authentication Mechanism for IoT Networks
    Emerson, Shamini
    Choi, Young-Kyu
    Hwang, Dong-Yeop
    Kim, Kang-Seok
    Kim, Ki-Hyung
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1072 - 1074
  • [7] Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
    Rasheed, Amar
    Hashemi, Ray R.
    Bagabas, Ayman
    Young, Jeffrey
    Badri, Chanukya
    Patel, Keyur
    2019 IEEE INTERNATIONAL CONFERENCE ON RFID (IEEE RFID), 2019,
  • [8] The Integrating Application of Machine learning and Internet of Things (IoT)
    Chen, Yanda
    PROCEEDINGS OF THE ADVANCES IN MATERIALS, MACHINERY, ELECTRICAL ENGINEERING (AMMEE 2017), 2017, 114 : 755 - 758
  • [9] OAuth-IoT: an access control framework for the Internet of Things based on open standards
    Sciancalepore, Savio
    Piro, Giuseppe
    Caldarola, Daniele
    Boggia, Gennaro
    Bianchi, Giuseppe
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 676 - 681
  • [10] Distributed Key Management Authentication algorithm in Internet of Things (IOT)
    Rachini, Ali S.
    Khatoun, R.
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,