*banner
 

Authentication and Authorization for the Internet of Things
Hokeun Kim, Edward A. Lee

Citation
Hokeun Kim, Edward A. Lee. "Authentication and Authorization for the Internet of Things". IEEE IT Professional, 19(5):27-33, October 2017.

Abstract
Authentication and authorization are essential parts of basic security processes and are sorely needed in the Internet of Things (IoT). The emergence of edge and fog computing creates new opportunities for security and trust management in the IoT. In this paper, we discuss some existing solutions to establish and manage trust in networked systems and argue that these solutions face daunting challenges when scaled to the IoT. We give a vision of efficient and scalable trust management for the IoT based on locally centralized, globally distributed trust management using an open-source infrastructure with local authentication and authorization entities to be deployed on edge devices.

Electronic downloads

Citation formats  
  • HTML
    Hokeun Kim, Edward A. Lee. <a
    href="http://chess.eecs.berkeley.edu/pubs/1193.html"
    >Authentication and Authorization for the Internet of
    Things</a>, <i>IEEE IT Professional</i>,
    19(5):27-33, October 2017.
  • Plain text
    Hokeun Kim, Edward A. Lee. "Authentication and
    Authorization for the Internet of Things".
    <i>IEEE IT Professional</i>, 19(5):27-33,
    October 2017.
  • BibTeX
    @article{KimLee17_AuthenticationAuthorizationForInternetOfThings,
        author = {Hokeun Kim and Edward A. Lee},
        title = {Authentication and Authorization for the Internet
                  of Things},
        journal = {IEEE IT Professional},
        volume = {19},
        number = {5},
        pages = {27-33},
        month = {October},
        year = {2017},
        abstract = {Authentication and authorization are essential
                  parts of basic security processes and are sorely
                  needed in the Internet of Things (IoT). The
                  emergence of edge and fog computing creates new
                  opportunities for security and trust management in
                  the IoT. In this paper, we discuss some existing
                  solutions to establish and manage trust in
                  networked systems and argue that these solutions
                  face daunting challenges when scaled to the IoT.
                  We give a vision of efficient and scalable trust
                  management for the IoT based on locally
                  centralized, globally distributed trust management
                  using an open-source infrastructure with local
                  authentication and authorization entities to be
                  deployed on edge devices. },
        URL = {http://chess.eecs.berkeley.edu/pubs/1193.html}
    }
    

Posted by Hokeun Kim on 5 Jul 2017.
Groups: chess
For additional information, see the Publications FAQ or contact webmaster at chess eecs berkeley edu.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.

©2002-2018 Chess