Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices

被引:0
|
作者
Grande, Elias [1 ]
Beltran, Marta [1 ]
机构
[1] Univ Rey Juan Carlos, Dept Comp, Madrid, Spain
关键词
Access Control; Delegation of Authorization; Identity Management; Internet of Things; Name-oriented Networking; Reverse Addressing; ACCESS; SCHEME;
D O I
10.5220/0009804705590564
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is not a traditional network, and this is the reason why it presents new and unique challenges such as identification, addressing, naming, authentication or authorization of constrained devices. Edge approaches rely on distributed platforms at the network edge serving as a bridge between the physical world (things and data sources, often very constrained devices) and the IoT-cloud services (digital services offered from full-resource servers in the cloud, often not real-time and bandwidth-consuming). The main contributions of this work are the specification of a new event-driven addressing approach for IoT relying on edge-centric delegation of authorization which appropriately adapts and extends the well-known OAuth 2.0 specification for the IoT and a novel approach for naming constrained devices in large scale scenarios that does not depend on the application domain or on the deployment and implementation details. Furthermore, the definition of the Enrolment and Action flows solving the most important challenges arising in the considered scenario: enrolment at the edge device, name-oriented networking, authentication, and authorization using access control tokens as a mechanism for transferring access rights from one agent (edge device) to another (constrained device).
引用
收藏
页码:559 / 564
页数:6
相关论文
共 50 条
  • [1] Securing all devices in the internet of things
    Reiter, Gil
    ECN Electronic Component News, 2015, 59 (06): : 20 - 22
  • [2] Design and implementation of Internet of Things for emergency medical devices based on cloud-edge-device architecture
    Fan Y.
    Liang H.
    Sun J.
    Zhang B.
    Zhu H.
    Cao D.
    Zhang Z.
    He K.
    Shengwu Yixue Gongchengxue Zazhi/Journal of Biomedical Engineering, 2023, 40 (01): : 103 - 109
  • [3] Challenges of securing Internet of Things devices: A survey
    Samaila, Musa G.
    Neto, Miguel
    Fernandes, Diogo A. B.
    Freire, Mario M.
    Inacio, Pedro R. M.
    SECURITY AND PRIVACY, 2018, 1 (02)
  • [4] Hyperledger Fabric Blockchain for Securing the Edge Internet of Things
    Honar Pajooh, Houshyar
    Rashid, Mohammad
    Alam, Fakhrul
    Demidenko, Serge
    SENSORS, 2021, 21 (02) : 1 - 29
  • [5] Securing Internet of Things Devices Using The Network Context
    Trnka, Michal
    Svacina, Jan
    Cerny, Tomas
    Song, Eunjee
    Hong, Jiman
    Bures, Miroslav
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4017 - 4027
  • [6] Edge Networks & Devices for the Internet of Things
    Kirstein, Peter T.
    DAEDALUS, 2016, 145 (01) : 33 - 42
  • [7] Efficient adaptive framework for securing the Internet of Things devices
    Farooq, Umer
    Ul Hasan, Najam
    Baig, Imran
    Shehzad, Naeem
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)
  • [8] Security of Internet of Things edge devices
    Lv, Zhihan
    SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (12): : 2446 - 2456
  • [9] Efficient adaptive framework for securing the Internet of Things devices
    Umer Farooq
    Najam Ul Hasan
    Imran Baig
    Naeem Shehzad
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [10] Introduction to Securing the Cloud and the Internet of Things mini-track
    Yeager, William J.
    Morin, Jean-Henry
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 5762 - 5762