【24h】

New paradigms for access control in constrained environments

机译:受限环境中访问控制的新范例

获取原文
获取原文并翻译 | 示例

摘要

The Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper addresses authentication and access control in the frame of the IoT. It presents Physical Unclonable Functions (PUF), which can provide cheap, secure, tamper-proof secret keys to authentify constrained M2M devices. To be successfully used in the IoT context, this technology needs to be embedded in a standardized identity and access management framework. On the other hand, Embedded Subscriber Identity Module (eSIM) can provide cellular connectivity with scalability, interoperability and standard compliant security protocols. The paper discusses an authorization scheme for a constrained resource server taking advantage of PUF and eSIM features. Concrete IoT uses cases are discussed (SCADA and building automation).
机译:物联网(IoT)即将到来,已经连接了超过100亿个设备,预计在未来五年中将部署五倍的设备。技术标准化以及政府管理和促进快速创新是物联网的主要挑战。但是,安全性和隐私性是使IoT可靠且值得信赖的关键。物联网的安全机制应提供可扩展性,互操作性和轻便性等功能。本文介绍了物联网框架中的身份验证和访问控制。它提供了物理不可克隆功能(PUF),可以提供便宜,安全,防篡改的秘密密钥来验证受约束的M2M设备。为了在物联网环境中成功使用,该技术需要嵌入到标准化的身份和访问管理框架中。另一方面,嵌入式订户身份模块(eSIM)可以提供具有可伸缩性,互操作性和符合标准的安全协议的蜂窝连接。本文讨论了利用PUF和eSIM功能的受限资源服务器的授权方案。讨论了具体的物联网用例(SCADA和楼宇自动化)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号