IOT Security
IOT Security
IOT Security
Security IN
the Internet of Things
Mobile Internet
Internet of things
Top barriers to iot and m2m adoption
ACCESS ACCESS
Access
Access
Data in Transit
Challenges
•Authentication
•Authorization
Provisioning Device Identity
IDM System
PKI (SE)
I’m an Authentic device
I’m unique (D) Verify authenticity and
Register me registers device
Register user, AuthN, claim ownership
AM System
Verify identity of user,
Register user,
Register me Authenticate user
Authenticate Proof possession of
PKI (SE) Device
I own device D
Create Relationship
User-device
I allow device D to
send data on my
behalf to service S1 Generates OAuth2 Token
for 1 day
Provision Refresh and
Store R &A
Access Token to device
Tokens
Device send data on behalf of user
AM System
AM with
UMA System
Authenticate
PKI (SE)
I want to Share my data with
My Insurance Company
…. Lost my device
HTTP, MQTT, SASL
Revoke token
Network Services
IoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more
and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged
has reached an unprecedented level. As sensitive and private information exchanged between
things, privacy becomes a major concern. Among many important issues, scalability,
transparency, and reliability are considered as new challenges that differentiate IoT from the
conventional Internet.
we enumerate the IoT communication scenarios and investigate the threats to the large-scale,
unreliable, pervasive computing environment. To cope with these new challenges, the
conventional security architecture will be revisited. In particular, various authentication
schemes will be evaluated to ensure the confidentiality and integrity of the exchanged data.
REFERENCES
3.Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE
Communications Magazine 32(9), 33–38 (1994)CrossRefGoogle Scholar
4.OpenID, http://openid.net/specs/openid-authentication-1_1.html