scholarly journals Authentication and Authorization Rules Sharing for Internet of Things

2016 ◽  
Vol 2017 (1) ◽  
pp. 35-52 ◽  
Author(s):  
Michal Trnka ◽  
Tomas Cerny ◽  
◽  
Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 772 ◽  
Author(s):  
Houshyar Honar Pajooh ◽  
Mohammad Rashid ◽  
Fakhrul Alam ◽  
Serge Demidenko

The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the security problems within the 5G-enabled IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks while simplifying the implementation. The concept of clustering is utilized in order to facilitate the multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated Annealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication and authorization. Local private blockchain implementation facilitates communications between the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and security while also providing a network authentication mechanism. The open-source Hyperledger Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The simulation results demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported approaches. The proposed lightweight blockchain model is also shown to be better suited to balance network latency and throughput as compared to a traditional global blockchain.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2832 ◽  
Author(s):  
Pantaleone Nespoli ◽  
Mattia Zago ◽  
Alberto Huertas Celdrán ◽  
Manuel Gil Pérez ◽  
Félix Gómez Mármol ◽  
...  

Continuous authentication was introduced to propose novel mechanisms to validate users’ identity and address the problems and limitations exposed by traditional techniques. However, this methodology poses several challenges that remain unsolved. In this paper, we present a novel framework, PALOT, that leverages IoT to provide context-aware, continuous and non-intrusive authentication and authorization services. To this end, we propose a formal information system model based on ontologies, representing the main source of knowledge of our framework. Furthermore, to recognize users’ behavioral patterns within the IoT ecosystem, we introduced a new module called “confidence manager”. The module is then integrated into an extended version of our early framework architecture, IoTCAF, which is consequently adapted to include the above-mentioned component. Exhaustive experiments demonstrated the efficacy, feasibility and scalability of the proposed solution.


2020 ◽  
Vol 8 (5) ◽  
pp. 2756-2760

In pervasive environment, the opportunity of unidentified objects involving in malevolent interactions increases due to the lack of centralized services. Traditional authentication and access control rules cannot be applied due to limitations of foot print of the objects used in Internet of Things. The proposed model presents authentication and authorization for an IoT-based ad-hoc objects using human notion of trust. The paper presents testing the proposed model with relevant use-cases in patient monitoring healthcare devices and presents the analysis results used in the critical care areas.


2021 ◽  
Vol 10 (3) ◽  
pp. 1658-1668
Author(s):  
Manmeet Mahinderjit Singh ◽  
Richard Frank ◽  
Wan Mohd Nazmee Wan Zainon

The growth of technologies; infrastructures and platforms with less or no security protection in emerging big data and internet of things (IoT) trends increase the likelihood of cybercrime attacks. With the rise of coronavirus disease-2019 (Covid-19) pandemic towards mankind, more cybercrimes are designed to penetrate one’s cognitive mind in revealing sensitive details. In this paper; an exploration of cybercrime threats in Southeast Asia country; Malaysia from year 2008 up to 2020 and its hike trends and impacts will be discussed. An investigation revolving the study of cyber-criminology and the reasoning behind the growth in terms of technological advancement will be presented. The findings suggest that the consequences and impacts of the cyberspace attacks are beyond the loss of money and reputations. It now becomes the failure of the global systemic altogether. As a mechanism to handle this would be to focus on protecting mission critical applications in pervasive environment. In this paper, a comprehensive authentication and authorization framework in safeguarding applications and users in the pervasive environment will be presented.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 58800-58816
Author(s):  
Gauhar Ali ◽  
Naveed Ahmad ◽  
Yue Cao ◽  
Shahzad Khan ◽  
Haitham Cruickshank ◽  
...  

Author(s):  
Padmavathi U. ◽  
Narendran Rajagopalan

Blockchain refers to a distributed ledger technology that helps people to regulate and manage their information without any intermediaries. This technology emerges as a promising panacea for authentication and authorization with potential for use in every possible domain including financial, manufacturing, educational institutions, etc. Blockchain has its birth through the concept of Bitcoin, a digital cryptocurrency by Satoshi Nakamoto, called as Blockchain 1.0. Blockchain 2.0 came into existence in 2014 with Ethereum and smart contracts. The challenges such as scalability, interoperability, sustainability, and governance led to the next generation of Blockchain also called as IOTA, a blockchainless cryptocurrency for the internet of things runs on the top of their own ledger called Tangle, which is immune towards quantum computers. This disruptive technology evolved to provide cross chain support and more security through Blockchain 4.0. Finally, the chapter concludes by discussing the various applications of this technology and its advantages and security issues.


Sign in / Sign up

Export Citation Format

Share Document