메뉴 건너뛰기




Volumn 33, Issue 4, 2015, Pages 690-702

Toward a lightweight authentication and authorization framework for smart objects

Author keywords

[No Author keywords available]

Indexed keywords

COMPLIANT MECHANISMS; INTERNET; INTERNET OF THINGS; LIFE CYCLE; MOBILE SECURITY; NETWORK ARCHITECTURE; NETWORK SECURITY;

EID: 84928015480     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2015.2393436     Document Type: Article
Times cited : (120)

References (63)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of things: A survey
    • Oct.
    • L. Atzori, A. Iera, and G. Morabito, "The Internet of things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 4
    • 51249107460 scopus 로고    scopus 로고
    • IPV6 over lowpower wireless personal area networks (6lowpans): Overview, assumptions, problem statement, goals
    • Fremont, CA, USA, RFC 4919 Aug.
    • N. Kushalnagar, G. Montenegro, and C. Schumacher, "IPV6 over lowpower wireless personal area networks (6lowpans): Overview, assumptions, problem statement, goals," IETF, Fremont, CA, USA, RFC 4919, Aug. 2007, vol. 10.
    • (2007) IETF , vol.10
    • Kushalnagar, N.1    Montenegro, G.2    Schumacher, C.3
  • 5
    • 84861562486 scopus 로고    scopus 로고
    • GLoWBAL IP: An adaptive and transparent IPv6 integration in the Internet of things
    • A. J. Jara, M. A. Zamora, and A. Skarmeta, "GLoWBAL IP: An adaptive and transparent IPv6 integration in the Internet of things," Mobile Inf. Syst., vol. 8, no. 3, pp. 177-197, 2012.
    • (2012) Mobile Inf. Syst. , vol.8 , Issue.3 , pp. 177-197
    • Jara, A.J.1    Zamora, M.A.2    Skarmeta, A.3
  • 6
    • 84924277319 scopus 로고    scopus 로고
    • The constrained application protocol (COAP)
    • Fremont, CA, USA, RFC 7252, Jun.
    • Z. Shelby, K. Hartke, and C. Bormann, "The constrained application protocol (COAP)," IETF, Fremont, CA, USA, RFC 7252, Jun. 2014, vol. 10.
    • (2014) IETF , vol.10
    • Shelby, Z.1    Hartke, K.2    Bormann, C.3
  • 7
    • 84898603536 scopus 로고    scopus 로고
    • Semantic web of things: An analysis of the application semantics for the IoT moving towards the IoT convergence
    • Apr.
    • A. J. Jara et al., "Semantic web of things: An analysis of the application semantics for the IoT moving towards the IoT convergence," Int. J. Web Grid Serv., vol. 10, no. 2/3, pp. 244-272, Apr. 2014.
    • (2014) Int. J. Web Grid Serv. , vol.10 , Issue.2-3 , pp. 244-272
    • Jara, A.J.1
  • 8
    • 84928029704 scopus 로고    scopus 로고
    • Security and privacy challenges in the Internet of things
    • C. P. Mayer, "Security and privacy challenges in the Internet of things," Electron. Commun. Eur. Assoc. Sci. Technol., vol. 17, pp. 1-12, 2009.
    • (2009) Electron. Commun. Eur. Assoc. Sci. Technol. , vol.17 , pp. 1-12
    • Mayer, C.P.1
  • 9
    • 80052680150 scopus 로고    scopus 로고
    • An overview of privacy and security issues in the Internet of things
    • NewYork, NY, USA: Springer- Verlag
    • C. M. Medaglia and A. Serbanati, "An overview of privacy and security issues in the Internet of things," in The Internet of Things. NewYork, NY, USA: Springer-Verlag, 2010, pp. 389-395.
    • (2010) The Internet of Things , pp. 389-395
    • Medaglia, C.M.1    Serbanati, A.2
  • 10
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision applications & research challenges
    • Sep.
    • D. Miorandi, S. Sicari, F. Pellegrini, and I. Chlamtac, "Internet of things: Vision, applications & research challenges," Ad Hoc Netw., vol. 10, no. 7, pp. 1497-1516, Sep. 2012.
    • (2012) Ad Hoc Netw. , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    Pellegrini, F.3    Chlamtac, I.4
  • 11
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed Internet of things
    • Jul.
    • R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed Internet of things," Comput. Netw., vol. 57, no. 10, pp. 2266-2279, Jul. 2013.
    • (2013) Comput. Netw. , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 12
    • 83555176391 scopus 로고    scopus 로고
    • Security challenges in the IP-based Internet of things
    • Dec.
    • T. Heer et al., "Security challenges in the IP-based Internet of things," Wireless Pers. Commun., vol. 61, no. 3, pp. 527-542, Dec. 2011.
    • (2011) Wireless Pers. Commun. , vol.61 , Issue.3 , pp. 527-542
    • Heer, T.1
  • 13
    • 84878920667 scopus 로고    scopus 로고
    • Enabling end-to-end secure communication between wireless sensor networks and the Internet
    • Jul.
    • H. Yu, J. He, T. Zhang, P. Xiao, and Y. Zhang, "Enabling end-to-end secure communication between wireless sensor networks and the Internet," World Wide Web, vol. 16, no. 4, pp. 1-26, Jul. 2013.
    • (2013) World Wide Web , vol.16 , Issue.4 , pp. 1-26
    • Yu, H.1    He, J.2    Zhang, T.3    Xiao, P.4    Zhang, Y.5
  • 14
    • 79959372828 scopus 로고    scopus 로고
    • Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications
    • Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11, 2004.
    • (2004) IEEE Std 802.11
  • 15
    • 6344233247 scopus 로고    scopus 로고
    • Extensible authentication protocol (eap)
    • Fremont, CA, USA, RFC Jun.
    • B. Aboba et al., "Extensible Authentication Protocol (EAP)," IETF, Fremont, CA, USA, RFC 3748, Jun. 2004.
    • (2004) IETF , vol.3748
    • Aboba, B.1
  • 16
    • 0003535506 scopus 로고    scopus 로고
    • Remote authentication dial in user service
    • Fremont, CA, USA, RFC Jun.
    • C. Rigney, S. Willens, A. Rubens, and W. Simpson, "Remote authentication dial in user service," IETF, Fremont, CA, USA, RFC 2865, Jun. 2000.
    • (2000) IETF , vol.2865
    • Rigney, C.1    Willens, S.2    Rubens, A.3    Simpson, W.4
  • 18
    • 84921628525 scopus 로고    scopus 로고
    • DCapBAC: Embedding authorization logic into smart things through ECC optimizations
    • May 2014
    • J. L. Hernández-Ramos, A. J. Jara, L. Marín, and A. F. S. Gómez, "DCapBAC: Embedding authorization logic into smart things through ECC optimizations," Int. J. Comput. Math., pp. 1-22, May 2014.
    • Int. J. Comput. Math. , pp. 1-22
    • Hernández-Ramos, J.L.1    Jara, A.J.2    Marín, L.3    Gómez, A.F.S.4
  • 20
  • 21
    • 84900391197 scopus 로고    scopus 로고
    • A decentralized approach for security and privacy challenges in the Internet of things
    • A. F. Skarmeta, J. L. Hernandez-Ramos, andM.Moreno, "A decentralized approach for security and privacy challenges in the Internet of things," in Proc. IEEE WF-IoT, 2014, pp. 67-72.
    • (2014) Proc. IEEE WF-IoT , pp. 67-72
    • Skarmeta, A.F.1    Hernandez-Ramos, A.2    Moreno, J.L.3
  • 22
    • 80052854156 scopus 로고    scopus 로고
    • Securing the Internet of things
    • Sep.
    • R. Roman, P. Najera, and J. Lopez, "Securing the Internet of things," Computer, vol. 44, no. 9, pp. 51-58, Sep. 2011.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 23
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things-New security and privacy challenges
    • Jan.
    • R. H. Weber, "Internet of things-New security and privacy challenges," Comput. Law Security Rev., vol. 26, no. 1, pp. 23-30, Jan. 2010.
    • (2010) Comput. Law Security Rev. , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 24
    • 84928029871 scopus 로고    scopus 로고
    • PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
    • P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications," Int. J. Distrib. Sensor Netw., vol. 14, 2014, Art. ID. 357430.
    • (2014) Int. J. Distrib. Sensor Netw. , vol.14
    • Porambage, P.1    Schmitt, C.2    Kumar, P.3    Gurtov, A.4    Ylianttila, M.5
  • 25
    • 33746613037 scopus 로고    scopus 로고
    • Datagram transport layer security (DTLS)
    • Fremont, CA, USA, RFC
    • E. Rescola and N. Modadugu, "Datagram transport layer security (DTLS)," IETF, Fremont, CA, USA, RFC 4347, 2006.
    • (2006) IETF , vol.4347
    • Rescola, E.1    Modadugu, N.2
  • 26
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. IPSN, 2008, pp. 245-256.
    • (2008) Proc. IPSN , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 27
    • 84887394939 scopus 로고    scopus 로고
    • Security bootstrapping solution for resource-constrained devices
    • Fremont, CA, USA Draft-Sarikaya-Core-Sbootstrapping-05
    • B. Sarikaya, Y. Ohba, R. Moskowitz, Z. Cao, and R. Cragie, "Security bootstrapping solution for resource-constrained devices," IETF, Fremont, CA, USA, 2012, Draft-Sarikaya-Core-Sbootstrapping-05.
    • (2012) IETF
    • Sarikaya, B.1    Ohba, Y.2    Moskowitz, R.3    Cao, Z.4    Cragie, R.5
  • 28
    • 84891683415 scopus 로고    scopus 로고
    • Slimfit-A HIP DEX compression layer for the IP-based Internet of things
    • R. Hummen, J. Hiller, M. Henze, and K. Wehrle, "Slimfit-A HIP DEX compression layer for the IP-based Internet of things," in Proc. IEEE 9th Int. Conf. WiMob, 2013, pp. 259-266.
    • (2013) Proc. IEEE 9th Int. Conf. WiMob , pp. 259-266
    • Hummen, R.1    Hiller, J.2    Henze, M.3    Wehrle, K.4
  • 29
    • 69649101811 scopus 로고    scopus 로고
    • Protocol for carrying authentication for network access (PANA)
    • Fremont, CA, USA, RFC
    • D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig, and A. Yegin, "Protocol for carrying authentication for network access (PANA)," IETF, Fremont, CA, USA, RFC 5191, 2008.
    • (2008) IETF , vol.5191
    • Forsberg, D.1    Ohba, Y.2    Patil, B.3    Tschofenig, H.4    Yegin, A.5
  • 32
    • 84887348851 scopus 로고    scopus 로고
    • PANATIKI: A network access control implementation based on PANA for IoT devices
    • Nov.
    • P. M. Sanchez, R. M. Lopez, and A. F. G. Skarmeta, "PANATIKI: A network access control implementation based on PANA for IoT devices," Sensors, vol. 13, no. 11, pp. 14 888-14 917, Nov. 2013.
    • (2013) Sensors , vol.13 , Issue.11 , pp. 14888-14917
    • Sanchez, P.M.1    Lopez, R.M.2    Skarmeta, A.F.G.3
  • 33
    • 62149118079 scopus 로고    scopus 로고
    • The eap-psk protocol: A pre-shared key extensible authentication protocol (EAP) method
    • Fremont, CA, USA, RFC
    • F. Bersani and H. Tschofenig, "The eap-psk protocol: A pre-shared key extensible authentication protocol (EAP) method," IETF, Fremont, CA, USA, RFC 4764, 2007.
    • (2007) IETF , vol.4764
    • Bersani, F.1    Tschofenig, H.2
  • 34
    • 84866349735 scopus 로고    scopus 로고
    • Authentication and access control in the internet of things
    • Macau, China, Jun.
    • J. Liu, Y. Xiao, and C. L. P. Chen, "Authentication and access control in the internet of things," in Proc. 32nd ICDCSW, Macau, China, Jun. 2012, pp. 588-592.
    • (2012) Proc. 32nd ICDCSW , pp. 588-592
    • Liu, J.1    Xiao, Y.2    Chen, C.L.P.3
  • 36
    • 84928029868 scopus 로고    scopus 로고
    • Security analysis and improvements of authentication and access control in the Internet of things
    • Aug.
    • B. Ndibanje, H.-J. Lee, and S.-G. Lee, "Security analysis and improvements of authentication and access control in the Internet of things," Sensors, vol. 14, no. 8, pp. 14 786-14 805, Aug. 2014.
    • (2014) Sensors , vol.14 , Issue.8 , pp. 14786-14805
    • Ndibanje, B.1    Lee, H.-J.2    Lee, S.-G.3
  • 37
    • 84894059526 scopus 로고    scopus 로고
    • An efficient authentication and access control scheme for perception layer of Internet of things
    • Jul.
    • N. Ye, Y. Zhu, R. Chuan Wang, R. Malekian, and L. Qiao-min, "An efficient authentication and access control scheme for perception layer of Internet of things," Appl. Math. Inf. Sci., vol. 8, no. 4, pp. 1617-1624, Jul. 2014.
    • (2014) Appl. Math. Inf. Sci. , vol.8 , Issue.4 , pp. 1617-1624
    • Ye, N.1    Zhu, Y.2    Chuan Wang, R.3    Malekian, R.4    Qiao-Min, L.5
  • 38
    • 33749080076 scopus 로고    scopus 로고
    • Attributed based access control (abac) for web services
    • Orlando, FL, USA, Jul.
    • E. Yuan and J. Tong, "Attributed Based Access Control (ABAC) for web services," in Proc. 12th IEEE ICWS, Orlando, FL, USA, Jul. 2005, pp. 561-569.
    • (2005) Proc. 12th IEEE ICWS , pp. 561-569
    • Yuan, E.1    Tong, J.2
  • 39
    • 84873426135 scopus 로고    scopus 로고
    • Identity Establishment and Capability based Access Control (IECAC) scheme for Internet of things
    • Taipei, Taiwan, Sep.
    • P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identity Establishment and Capability based Access Control (IECAC) scheme for Internet of things," in Proc. 15th Int. Symp. WPMC, Taipei, Taiwan, Sep. 2012, pp. 187-191.
    • (2012) Proc. 15th Int. Symp. WPMC , pp. 187-191
    • Mahalle, P.N.1    Anggorojati, B.2    Prasad, N.R.3    Prasad, R.4
  • 40
    • 84880621938 scopus 로고    scopus 로고
    • A capability-based security approach to manage access control in the Internet of things
    • Sep.
    • S. Gusmeroli, S. Piccione, and D. Rotondi, "A capability-based security approach to manage access control in the Internet of things," Math. Comput. Model., vol. 58, no. 5/6, pp. 1189-1205, Sep. 2013.
    • (2013) Math. Comput. Model. , vol.58 , Issue.5-6 , pp. 1189-1205
    • Gusmeroli, S.1    Piccione, S.2    Rotondi, D.3
  • 42
    • 70450170255 scopus 로고    scopus 로고
    • The application/json media type for javascript object notation (json)
    • Fremont, CA, USA, RFC Jul. [Online]. Available
    • D. Crockford, "The application/json Media Type for Javascript Object Notation (JSON)," IETF, Fremont, CA, USA, RFC 4627, Jul. 2006. [Online]. Available: Http://www.ietf.org/rfc/rfc4627.txt
    • (2006) IETF , vol.4627
    • Crockford, D.1
  • 43
    • 84880583164 scopus 로고    scopus 로고
    • Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier
    • Sep.
    • L. Marin, A. J. Jara, and A. F. Skarmeta, "Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier," Math. Comput. Model., vol. 58, no. 5/6, pp. 1155-1174, Sep. 2013.
    • (2013) Math. Comput. Model. , vol.58 , Issue.5-6 , pp. 1155-1174
    • Marin, L.1    Jara, A.J.2    Skarmeta, A.F.3
  • 44
    • 84949116483 scopus 로고    scopus 로고
    • Trust extension protocol for authentication in networks oriented to management (TEPANOM)
    • New York, NY, USA: Springer- Verlag
    • A. J. Jara, "Trust extension protocol for authentication in networks oriented to management (TEPANOM)," in Availability, Reliability, Security in Information Systems. New York, NY, USA: Springer-Verlag, 2014, pp. 155-165.
    • (2014) Availability, Reliability, Security in Information Systems , pp. 155-165
    • Jara, A.J.1
  • 48
    • 84881798595 scopus 로고    scopus 로고
    • The sensei real world Internet architecture
    • V. Tsiatsis et al., "The sensei real world Internet architecture," in Proc. Future Internet Assembly, 2010, pp. 247-256.
    • (2010) Proc. Future Internet Assembly , pp. 247-256
    • Tsiatsis, V.1
  • 49
    • 84894141883 scopus 로고    scopus 로고
    • An architecture for designing future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology
    • S. Sotiriadis et al., "An architecture for designing future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology," in Proc. IEEE 13th Int. Conf. BIBE, 2013, pp. 1-6.
    • (2013) Proc. IEEE 13th Int. Conf. BIBE , pp. 1-6
    • Sotiriadis, S.1
  • 51
    • 85019124540 scopus 로고    scopus 로고
    • Problem description for authorization in constrained environments
    • Fremont, CA, USA Draft-Seitz-Ace-Problem-Description-01
    • L. Seitz and G. Selander, "Problem description for authorization in constrained environments," IETF, Fremont, CA, USA, 2014, Draft-Seitz-Ace-Problem-Description-01.
    • (2014) IETF
    • Seitz, L.1    Selander, G.2
  • 52
    • 79955764516 scopus 로고    scopus 로고
    • Internet key exchange protocol version 2 (ikev2)
    • Fremont, CA, USA, RFC 5996, Sep.
    • C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, "Internet key exchange protocol version 2 (ikev2)," IETF, Fremont, CA, USA, RFC 5996, Sep. 2010.
    • (2010) IETF
    • Kaufman, C.1    Hoffman, P.2    Nir, Y.3    Eronen, P.4
  • 54
    • 84874292014 scopus 로고    scopus 로고
    • Lightweight IKEv2: A key management solution for both the compressed IPSec and the IEEE 802.15.4 security
    • S. Raza, T. Voigt, and V. Jutvik, "Lightweight IKEv2: A key management solution for both the compressed IPSec and the IEEE 802.15.4 security," in Proc. IETF Workshop Smart Object Security, 2012, pp. 1-2.
    • (2012) Proc. IETF Workshop Smart Object Security , pp. 1-2
    • Raza, S.1    Voigt, T.2    Jutvik, V.3
  • 55
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • Mar.
    • J. Dennis and E. V. Horn, "Programming semantics for multiprogrammed computations," Commun. ACM, vol. 9, no. 3, pp. 143-155, Mar. 1966.
    • (1966) Commun. ACM , vol.9 , Issue.3 , pp. 143-155
    • Dennis, J.1    Horn, E.V.2
  • 56
    • 84892572915 scopus 로고    scopus 로고
    • Multiplication and squaring with shifting primes on OpenRISC processors with hardware multiplier
    • L. Marin, A. J. Jara, and A. F. Gómez-Skarmeta, "Multiplication and squaring with shifting primes on OpenRISC processors with hardware multiplier," J. Universal Comput. Sci., vol. 19, no. 16, pp. 2368-2384, 2013.
    • (2013) J. Universal Comput. Sci. , vol.19 , Issue.16 , pp. 2368-2384
    • Marin, L.1    Jara, A.J.2    Gómez-Skarmeta, A.F.3
  • 57
    • 44949237454 scopus 로고    scopus 로고
    • Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS). Internet engineering task force
    • Fremont, CA, USA, RFC
    • S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Möller, "Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS). Internet engineering task force," IETF, Fremont, CA, USA, RFC 4492, 2006.
    • (2006) IETF , vol.4492
    • Blake-Wilson, S.1    Bolyard, N.2    Gupta, V.3    Hawk, C.4    Möller, B.5
  • 58
    • 84928029862 scopus 로고    scopus 로고
    • Actors in the ACE architecture
    • Fremont, CA, USA Draft-Gerdes-Ace-Actors-01
    • S. Gerdes, "Actors in the ACE architecture," IETF, Fremont, CA, USA, 2014, Draft-Gerdes-Ace-Actors-01.
    • (2014) IETF
    • Gerdes, S.1
  • 60
    • 67650675833 scopus 로고    scopus 로고
    • The EAP-TLS authentication protocol
    • Fremont, CA, USA, RFC
    • D. Simon, B. Aboba, and R. Hurst, "The EAP-TLS authentication protocol," IETF, Fremont, CA, USA, RFC 5216, 2008.
    • (2008) IETF , vol.5216
    • Simon, D.1    Aboba, B.2    Hurst, R.3
  • 62
    • 49949100301 scopus 로고    scopus 로고
    • NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
    • New York, NY, USA: Springer- Verlag
    • P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks," in Wireless Sensor Networks. New York, NY, USA: Springer-Verlag, 2008, pp. 305-320.
    • (2008) Wireless Sensor Networks , pp. 305-320
    • Szczechowiak, P.1    Oliveira, L.B.2    Scott, M.3    Collier, M.4    Dahab, R.5
  • 63
    • 84930759048 scopus 로고    scopus 로고
    • Ace use cases
    • Fremont, CA, USA Draft-Seitz-Ace-Usecases-01
    • L. Seitz, S. Gerdes, G. Selander, M. Mani, and S. Kumar, "ACE use cases," IETF, Fremont, CA, USA, 2014, Draft-Seitz-Ace-Usecases-01.
    • (2014) IETF
    • Seitz, L.1    Gerdes, S.2    Selander, G.3    Mani, M.4    Kumar, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.