scholarly journals Survey of Authentication and Authorization for the Internet of Things

2018 ◽  
Vol 2018 ◽  
pp. 1-17 ◽  
Author(s):  
Michal Trnka ◽  
Tomas Cerny ◽  
Nathaniel Stickney

The Internet of Things is currently getting significant interest from the scientific community. Academia and industry are both focused on moving ahead in attempts to enhance usability, maintainability, and security through standardization and development of best practices. We focus on security because of its impact as one of the most limiting factors to wider Internet of Things adoption. Numerous research areas exist in the security domain, ranging from cryptography to network security to identity management. This paper provides a survey of existing research applicable to the Internet of Things environment at the application layer in the areas of identity management, authentication, and authorization. We survey and analyze more than 200 articles, categorize them, and present current trends in the Internet of Things security domain.

Sensors ◽  
2018 ◽  
Vol 18 (6) ◽  
pp. 1920 ◽  
Author(s):  
Juanli Li ◽  
Jiacheng Xie ◽  
Zhaojian Yang ◽  
Junjie Li

Author(s):  
S. Kavitha ◽  
J. V. Anchitaalagammai ◽  
S. Nirmala ◽  
S. Murali

The chapter summarizes the concepts and challenges of DevOps in IoT, DevSecOps in IoT, integrating security into IoT, machine learning and AI in IoT of software engineering practices. DevOps is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops). The main characteristic of DevOps is the automation and monitoring at all steps of software construction, from integration, testing, releasing to deployment and infrastructure management. DevSecOps is a practice of integrating security into every aspect of an application lifecycle from design to development.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


2020 ◽  
Vol 106 ◽  
pp. 102240
Author(s):  
Saci Medileh ◽  
Abdelkader Laouid ◽  
El Moatez Billah Nagoudi ◽  
Reinhardt Euler ◽  
Ahcène Bounceur ◽  
...  

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 81451-81465 ◽  
Author(s):  
Guolong Shi ◽  
Yigang He ◽  
Baiqiang Yin ◽  
Lei Zuo ◽  
Peiliang She ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document