Sensors ◽  
2018 ◽  
Vol 18 (12) ◽  
pp. 4215 ◽  
Author(s):  
Xiaoyang Zhu ◽  
Youakim Badr

The Internet of Things aims at connecting everything, ranging from individuals, organizations, and companies to things in the physical and virtual world. The digital identity has always been considered as the keystone for all online services and the foundation for building security mechanisms such as authentication and authorization. However, the current literature still lacks a comprehensive study on the digital identity management for the Internet of Things (IoT). In this paper, we firstly identify the requirements of building identity management systems for IoT, which comprises scalability, interoperability, mobility, security and privacy. Then, we trace the identity problem back to the origin in philosophy, analyze the Internet digital identity management solutions in the context of IoT and investigate recent surging blockchain sovereign identity solutions. Finally, we point out the promising future research trends in building IoT identity management systems and elaborate challenges of building a complete identity management system for the IoT, including access control, privacy preserving, trust and performance respectively.


2017 ◽  
Author(s):  
Ivan Zyrianoff ◽  
Fabrizio Borelli ◽  
Alexandre Heideker ◽  
Gabriela Biondi ◽  
Carlos Kamienski

Context-Aware Management Systems have been proposed in the last years to perform automatic decision making for the Internet of Things. Although scalability is an indispensable feature for those systems, there are no comprehensive results reporting their performance. This paper shows results of a performance analysis study of different context-aware architectures and introduces the SenSE platform for generating sensor synthetic data. Results show that different architectural choices impact system scalability and that automatic real time decision-making is feasible in an environment composed of dozens of thousands of sensors that continuously transmit data.


Author(s):  
Ivonne Thomas ◽  
Christoph Meinel

One of the main reasons is the problem of establishing trust relationships between independent parties—a problem inherent to open environments with multiple trust domains. In open environments, participants often do not know each other, but nevertheless require an existing trust relationship to perform critical transactions. Governments, commercial organizations, and academia alike have addressed this issue by providing better assurance guidelines for identity management. The outcome is a number of identity assurance frameworks that identify and cluster certain security criteria into levels of trust or levels of assurance (LoA). These approaches are described, compared, and assessed with regard to their role towards a reliable identity management across the Internet. Limitations are identified and trust levels for attributes are proposed as potential fields for further research.


2011 ◽  
Vol 37 (2) ◽  
pp. 147-159 ◽  
Author(s):  
Rodrigo Roman ◽  
Cristina Alcaraz ◽  
Javier Lopez ◽  
Nicolas Sklavos

Sensors ◽  
2014 ◽  
Vol 14 (2) ◽  
pp. 2944-2966 ◽  
Author(s):  
Zia Shamszaman ◽  
Safina Ara ◽  
Ilyoung Chong ◽  
Youn Jeong

2018 ◽  
Vol 12 (1) ◽  
pp. 39-44
Author(s):  
János Simon

The Internet of Things (IoT) is starting to appear everywhere in many shapes and forms. But security is one of the most crucial thing that could trip up the growth of the IoT. Following security principles used in enterprise computing can help clear that issue. Already there are more connected devices than people on the planet, according to leading researchers in this area. By 2020, there will be 50 billion connected devices, outnumbering people by more than 6 to 1. Most of these devices will be controllable over the Internet, and they will increasingly be responsible for collecting and transmitting sensitive data. Today consumers might own an app that collects information on their exercise routine. In a few years, those same people might have an Internet-enabled medical device that continually delivers data to their doctor. In the wrong hands, data from home management systems could be used to assess user’s whereabouts. Likewise, businesses could be vulnerable when they connect things like HVAC, irrigation, or commercial appliances.


Daedalus ◽  
2016 ◽  
Vol 145 (1) ◽  
pp. 33-42
Author(s):  
Peter T. Kirstein

This paper considers how existing concepts underlying the development of the Internet are being strained in the emerging Internet of Things (IoT). It also explores how the well-known and tried Domain Name Service concepts, which map hierarchic names to addresses, can be extended for the IoT. The extension greatly broadens the concept of name/address mapping to digital objects with identifier/attribute database mapping for physical objects, applications, and data. Finally, this essay discusses the properties of the identifier management systems, showing how scalability, security, and flexibility can be supported in the IoT.


2018 ◽  
Vol 2018 ◽  
pp. 1-17 ◽  
Author(s):  
Michal Trnka ◽  
Tomas Cerny ◽  
Nathaniel Stickney

The Internet of Things is currently getting significant interest from the scientific community. Academia and industry are both focused on moving ahead in attempts to enhance usability, maintainability, and security through standardization and development of best practices. We focus on security because of its impact as one of the most limiting factors to wider Internet of Things adoption. Numerous research areas exist in the security domain, ranging from cryptography to network security to identity management. This paper provides a survey of existing research applicable to the Internet of Things environment at the application layer in the areas of identity management, authentication, and authorization. We survey and analyze more than 200 articles, categorize them, and present current trends in the Internet of Things security domain.


Sign in / Sign up

Export Citation Format

Share Document