메뉴 건너뛰기




Volumn 15, Issue 2, 2015, Pages 1224-1234

IoT-OAS: An oauth-based authorization service architecture for secure services in IoT scenarios

Author keywords

authorization; communication protocols; Internet of Things; security

Indexed keywords

ACCESS CONTROL; DATA STORAGE EQUIPMENT; HTTP; HYPERTEXT SYSTEMS; INTERNET PROTOCOLS; LOW POWER ELECTRONICS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE; NETWORK PROTOCOLS; SOCIAL NETWORKING (ONLINE);

EID: 84916934620     PISSN: 1530437X     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSEN.2014.2361406     Document Type: Article
Times cited : (214)

References (39)
  • 5
    • 84916924803 scopus 로고    scopus 로고
    • [Online]. Available: accessed Oct. 15
    • IPSO Alliance. [Online]. Available: Http://www.ipso-alliance.org/, accessed Oct. 15, 2014.
    • (2014)
  • 8
    • 84916924802 scopus 로고    scopus 로고
    • [Online]. Available:
    • Worldsensing, Barcelona, Spain. [Online]. Available: Http://wwww.worldsensing.com/
  • 9
    • 84880413059 scopus 로고    scopus 로고
    • Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview
    • [Online]. Available:
    • S. Cirani, G. Ferrari, and L. Veltri, "Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview," Algorithms, vol. 6, no. 2, pp. 197-226, 2013. [Online]. Available: Http://www.mdpi.com/1999-4893/6/2/197
    • (2013) Algorithms , vol.6 , Issue.2 , pp. 197-226
    • Cirani, S.1    Ferrari, G.2    Veltri, L.3
  • 10
    • 84876156481 scopus 로고    scopus 로고
    • Cyberentity security in the internet of things
    • Apr.
    • H. Ning, H. Liu, and L. T. Yang, "Cyberentity security in the internet of things," Computer, vol. 46, no. 4, pp. 46-53, Apr. 2013.
    • (2013) Computer , vol.46 , Issue.4 , pp. 46-53
    • Ning, H.1    Liu, H.2    Yang, L.T.3
  • 11
    • 84883421524 scopus 로고    scopus 로고
    • A lightweight multicast authentication mechanism for small scale IoT applications
    • Oct.
    • X. Yao, X. Han, X. Du, and X. Zhou, "A lightweight multicast authentication mechanism for small scale IoT applications," IEEE Sensors J., vol. 13, no. 10, pp. 3693-3701, Oct. 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3693-3701
    • Yao, X.1    Han, X.2    Du, X.3    Zhou, X.4
  • 12
    • 84906756164 scopus 로고    scopus 로고
    • CPAL: A conditional privacy-preserving authentication with access linkability for roaming service
    • Feb.
    • C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen, "CPAL: A conditional privacy-preserving authentication with access linkability for roaming service," IEEE Internet Things J., vol. 1, no. 1, pp. 46-57, Feb. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.1 , pp. 46-57
    • Lai, C.1    Li, H.2    Liang, X.3    Lu, R.4    Zhang, K.5    Shen, X.6
  • 13
    • 84883394343 scopus 로고    scopus 로고
    • Practical secure communication for integrating wireless sensor networks into the internet of things
    • Oct.
    • F. Li and P. Xiong, "Practical secure communication for integrating wireless sensor networks into the internet of things," IEEE Sensors J., vol. 13, no. 10, pp. 3677-3684, Oct. 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3677-3684
    • Li, F.1    Xiong, P.2
  • 16
    • 84899017569 scopus 로고    scopus 로고
    • An open source implementation of the protocol for carrying authentication for network access: OpenPANA
    • Mar.
    • P. Moreno-Sanchez, R. Marin-Lopez, and F. Vidal-Meca, "An open source implementation of the protocol for carrying authentication for network access: OpenPANA," IEEE Netw., vol. 28, no. 2, pp. 49-55, Mar. 2014.
    • (2014) IEEE Netw. , vol.28 , Issue.2 , pp. 49-55
    • Moreno-Sanchez, P.1    Marin-Lopez, R.2    Vidal-Meca, F.3
  • 17
    • 0003969635 scopus 로고
    • Department of Defense Trusted Computer System Evaluation Criteria
    • Dec. [Online]. Available:
    • United States Department of Defense, "Department of Defense Trusted Computer System Evaluation Criteria," U.S. Dept. Defense, Tech. Rep. DoD 5200.28-STD, Dec. 1985. [Online]. Available: Http://csrc.nist.gov/publications/history/dod85.pdf
    • (1985) U.S. Dept. Defense, Tech. Rep. DoD 5200.28-STD
  • 19
    • 84992227458 scopus 로고    scopus 로고
    • Proposed NIST standard for role-based access control
    • Aug. [Online]. Available:
    • D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 224-274, Aug. 2001. [Online]. Available: Http://doi.acm.org/10.1145/501978.501980
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 224-274
    • Ferraiolo, D.F.1    Sandhu, R.2    Gavrila, S.3    Kuhn, D.R.4    Chandramouli, R.5
  • 21
    • 33749080076 scopus 로고    scopus 로고
    • Attributed based access control (ABAC) for web services
    • Jul.
    • E. Yuan and J. Tong, "Attributed based access control (ABAC) for web services," in Proc. IEEE Int. Conf. Web Services (ICWS), vol. 856, Jul. 2005, p. 2.
    • (2005) Proc. IEEE Int. Conf. Web Services (ICWS) , vol.856 , pp. 2
    • Yuan, E.1    Tong, J.2
  • 23
    • 77954942442 scopus 로고    scopus 로고
    • Modular context-aware access control for medical sensor networks
    • New York, NY, USA [Online]. Available:
    • O. Garcia-Morchon and K. Wehrle, "Modular context-aware access control for medical sensor networks," in Proc. 15th ACM Symp. Access Control Models Technol. (SACMAT), New York, NY, USA, 2010, pp. 129-138. [Online]. Available: Http://doi.acm.org/10.1145/1809842. 1809864
    • (2010) Proc. 15th ACM Symp. Access Control Models Technol. (SACMAT) , pp. 129-138
    • Garcia-Morchon, O.1    Wehrle, K.2
  • 25
    • 84916924800 scopus 로고    scopus 로고
    • Dec. [Online]. Available:
    • OpenID authentication 2.0-Final," OpenID Foundation, Tech. Rep., Dec. 2007. [Online]. Available: Http://openid.net/specs/openidauthentication-2-0.html
    • (2007) OpenID Foundation, Tech. Rep.
  • 28
    • 70449496394 scopus 로고    scopus 로고
    • [Online]. Available: accessed Oct. 15
    • The Contiki Operating System. [Online]. Available: Http://www.contikios. org, accessed Oct. 15, 2014.
    • (2014) The Contiki Operating System
  • 33
    • 81155141912 scopus 로고    scopus 로고
    • The keccak sha-3 submission
    • National Institute of Standards and Technology (NIST) [Online]. Available:
    • G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, "The Keccak SHA-3 submission," in Submission to NIST (Round 3). National Institute of Standards and Technology (NIST), 2011. [Online]. Available: Http://keccak.noekeon.org/Keccak-submission-3.pdf
    • (2011) Submission to NIST (Round 3)
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 34
    • 83355168853 scopus 로고    scopus 로고
    • Powertrace: Networklevel power profiling for low-power wireless networks
    • Kista, Sweden, Tech. Rep. T2011:05 Mar. [Online]. Available:
    • A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes, "Powertrace: Networklevel power profiling for low-power wireless networks," Swedish Institute. Comput. Sci., Kista, Sweden, Tech. Rep. T2011:05, Mar. 2011. [Online]. Available: Http://soda.swedish-ict.se/4112/1/T2011-05.pdf
    • (2011) Swedish Institute. Comput. Sci.
    • Dunkels, A.1    Eriksson, J.2    Finne, N.3    Tsiftes, N.4
  • 35
    • 84863713348 scopus 로고    scopus 로고
    • Security considerations in the IP-based internet of things
    • Mar. [Online]. Available:
    • O. Garcia-Morchon, S. Keoh, S. Kumar, R. Hummen, and R. Struik, "Security considerations in the IP-based internet of things," IETF Internet Draft, Tech. Rep., Mar. 2012. [Online]. Available: Http://tools.ietf.org/id/draft-garcia-core-security-04
    • (2012) IETF Internet Draft Tech. Rep.
    • Garcia-Morchon, O.1    Keoh, S.2    Kumar, S.3    Hummen, R.4    Struik, R.5
  • 36
    • 84869815133 scopus 로고
    • TEA, a tiny encryption algorithm
    • B. Preneel, Ed. Berlin, Germany: Springer- Verlag [Online]. Available:
    • D. Wheeler and R. Needham, "TEA, a tiny encryption algorithm," in Fast Software Encryption (Lecture Notes in Computer Science), vol. 1008, B. Preneel, Ed. Berlin, Germany: Springer-Verlag, 1995, pp. 363-366. [Online]. Available: Http://dx.doi.org/10.1007/3-540-60590-8-29
    • (1995) Fast Software Encryption (Lecture Notes in Computer Science) , vol.1008 , pp. 363-366
    • Wheeler, D.1    Needham, R.2
  • 37
    • 33745777809 scopus 로고    scopus 로고
    • SEA: A scalable encryption algorithm for small embedded applications
    • J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds. Berlin, Germany: Springer- Verlag [Online]. Available:
    • F.-X. Standaert, G. Piret, N. Gershenfeld, and J.-J. Quisquater, "SEA: A scalable encryption algorithm for small embedded applications," in Smart Card Research and Advanced Applications (Lecture Notes in Computer Science), vol. 3928, J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds. Berlin, Germany: Springer-Verlag, 2006, pp. 222-236. [Online]. Available: Http://dx.doi.org/10.1007/11733447-16
    • (2006) Smart Card Research and Advanced Applications (Lecture Notes in Computer Science) , vol.3928 , pp. 222-236
    • Standaert, F.-X.1    Piret, G.2    Gershenfeld, N.3    Quisquater, J.-J.4
  • 38
    • 37149045263 scopus 로고    scopus 로고
    • Present: An ultra-lightweight block cipher
    • P. Paillier and I. Verbauwhede, Eds. Berlin, Germany: Springer- Verlag [Online]. Available:
    • A. Bogdanov et al., "PRESENT: An ultra-lightweight block cipher," in Cryptographic Hardware and Embedded Systems-CHES (Lecture Notes in Computer Science), vol. 4727, P. Paillier and I. Verbauwhede, Eds. Berlin, Germany: Springer-Verlag, 2007, pp. 450-466. [Online]. Available: Http://dx.doi.org/10.1007/978-3-540-74735-2-31
    • (2007) Cryptographic Hardware and Embedded Systems-CHES (Lecture Notes in Computer Science) , vol.4727 , pp. 450-466
    • Bogdanov, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.