Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE

被引:4
|
作者
Sousa, Patricia [1 ,2 ]
Magalhaes, Luis [1 ]
Resende, Joao [1 ,2 ]
Martins, Rolando [1 ,2 ]
Antunes, Luis [1 ]
机构
[1] Univ Porto, Fac Sci, Dept Comp Sci, P-4169007 Porto, Portugal
[2] Inst Syst & Comp Engn, Technol & Sci INESC TEC, P-4200465 Porto, Portugal
关键词
Internet of Things; FIWARE; authentication; secure communications; smart cities; INTERNET; THINGS; CHALLENGES; PLATFORM; PRIVACY;
D O I
10.3390/s21175898
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms +/- 65.11+delta. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Verifying a secure authentication protocol for IoT medical devices
    Bae, Woo-Sik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1985 - 1990
  • [2] Lightweight Authentication and Secure Communication Suitable for IoT Devices
    Buchovecka, Simona
    Lorencz, Robert
    Bucek, Jiri
    Kodytek, Filip
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 75 - 83
  • [3] Verifying a secure authentication protocol for IoT medical devices
    Woo-Sik Bae
    Cluster Computing, 2019, 22 : 1985 - 1990
  • [4] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [5] Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices
    Li, Xiaopeng
    Yan, Fengyao
    Zuo, Fei
    Zeng, Qiang
    Luo, Lannan
    MOBICOM'19: PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2019,
  • [6] A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices
    Mahalat, Mahabub Hasan
    Saha, Shreya
    Mondal, Anindan
    Sen, Bibhash
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 183 - 187
  • [7] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [8] Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices
    Vorakulpipat, Chalee
    Takahashi, Takeshi
    Rattanalerdnusorn, Ekkachan
    Thaenkaew, Phithak
    Inoue, Daisuke
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 279 - 282
  • [9] Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol
    Oliver, S. Gladson
    Purusothaman, T.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 767 - 780
  • [10] A secure authentication technique for connecting different IoT devices in the smart city infrastructure
    Sharma, Rohit
    Arya, Rajeev
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2333 - 2349