Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment

被引:15
|
作者
Claeys, Timothy [1 ]
Rousseau, Franck [1 ]
Tourancheau, Bernard [1 ]
机构
[1] Univ Grenoble Alpes, CNRS, Grenoble INP, LIG, F-38000 Grenoble, France
关键词
authorization; access tokens; key establishment; authentication;
D O I
10.1109/SIoT.2017.00006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a new authorization and authentication framework for the IoT that combines the security model of OAuth 1.0a with the lightweight building blocks of ACE. By designing self-securing tokens the security of the framework no longer depends on the security of the network stack. We use basic PKI functionalities to bootstrap a chain-of-trust between the devices which simplifies future token exchanges. Finally, we propose an alternate key establishment scheme for use cases where devices cannot directly communicate. We test our proposal by implementing the critical aspects on a STM32L4 microcontroller. The results indicate that our framework guarantees a strong level of security for IoT devices with basic asymmetric cryptography capabilities.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 50 条
  • [1] A Survey of Authenticated Key Agreement Protocols for Securing IoT
    Mohammad, Zeyad
    Abusukhon, Ahmad
    Abu Qattam, Thaer
    [J]. 2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 425 - 430
  • [2] Token-based authenticated key establishment protocols for three-party communication
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 758 - +
  • [3] Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
    Challa, Sravani
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2017, 5 : 3028 - 3043
  • [4] Securing User Access at IoT Middleware Using Attribute Based Access Control
    Garg, Hittu
    Dave, Mayank
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [5] Securing Home IoT Environments with Attribute-Based Access Control
    Bezawada, Bruhadeshwar
    Haefner, Kyle
    Ray, Indrakshi
    [J]. PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, : 43 - 53
  • [6] Securing Smart Home IoT Systems with Attribute-Based Access Control
    Goyal, Gaurav
    Liu, Peng
    Sural, Shamik
    [J]. SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 37 - 46
  • [7] Attribute-Based Access Control Scheme in Federated IoT Platforms
    Sciancalepore, Savio
    Pilc, Michal
    Schroeder, Svenja
    Bianchi, Giuseppe
    Boggia, Gennaro
    Pawlowski, Marek
    Piro, Giuseppe
    Plociennik, Marcin
    Weisgrab, Hannes
    [J]. INTEROPERABILITY AND OPEN-SOURCE SOLUTIONS FOR THE INTERNET OF THINGS (INTEROSS-IOT 2016), 2017, 10218 : 123 - 138
  • [8] Nonce-based Authenticated Key Establishment over OAuth 2.0 IoT Proof-of-Possession Architecture
    Navas, Renzo E.
    Lagos, Manuel
    Toutain, Laurent
    Vijayasankar, Kumaran
    [J]. 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 317 - 322
  • [9] Token-Based Access Control
    Gan, Guohua
    Chen, E.
    Zhou, Zhiyuan
    Zhu, Yan
    [J]. IEEE ACCESS, 2020, 8 (08): : 54189 - 54199
  • [10] An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role
    Oh, Se-Ra
    Kim, Young-Gab
    Cho, Sanghyun
    [J]. SENSORS, 2019, 19 (08)