Authentication and Authorization for IoT Devices in Disadvantaged Environments

2019 IEEE 5th World Forum on Internet of Things (WF-IoT)(2019)

引用 4|浏览20
暂无评分
摘要
Internet of Things (IoT) devices are increasingly being used to support operations in disadvantaged environments, such as those experienced by first responders, military, medics, and other field personnel. However, current IoT security efforts are mainly targeted at stable and connected environments such as home and industry. This paper presents an implementation for authentication and authorization of IoT devices in disadvantaged environments, based on an IETF proposal for authentication and authorization in resource-constrained environments (ACE). It includes capabilities for bootstrapping of credentials and token revocation to account for high-priority threats of node impersonation and theft, as well as limited connectivity.
更多
查看译文
关键词
IoT,security,standards,disadvantaged environments
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要