2014 IEEE World Forum on Internet of Things (WF-IoT) 2014
DOI: 10.1109/wf-iot.2014.6803106
|View full text |Cite
|
Sign up to set email alerts
|

Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The IoT device's identity and ownership is one of the main problems. Throughout its lifetime, a device's owner(s) can include the retailer, consumer, manufacturer, and supplier [58], [59]. The consumer's ownership of the device can be revoked or modified when an IoT device are compromised, sold again, or decommissioned.…”
Section: Heavy Loaded Cloud Services and Its Inefficiencymentioning
confidence: 99%
“…The IoT device's identity and ownership is one of the main problems. Throughout its lifetime, a device's owner(s) can include the retailer, consumer, manufacturer, and supplier [58], [59]. The consumer's ownership of the device can be revoked or modified when an IoT device are compromised, sold again, or decommissioned.…”
Section: Heavy Loaded Cloud Services and Its Inefficiencymentioning
confidence: 99%
“…This process converts, compresses, and stores heterogeneous IoT data into an integrated blockchain where it provides uniform access to different IoT systems connected as peers in it [43]. Governance of access and identities: Identity and access management (IAM) of IoT devices is facing multiple challenges such as the change of ownership during the lifetime of IoT devices from manufacturer to supplier then to retailer, until they end up in the hands of their consumers [44], [45]. Also, consumer ownership may change in case the IoT device is compromised, decommissioned, or resold.…”
Section: Blockchain For Iotmentioning
confidence: 99%
“…T2T identifier between different vendor products has mainly relied on IP addresses which is a managed process with several complexities of its own. An example of a farming industry scenario reported by Friese, et al [23] proved such complexity between a harvester and a truck that were unable to communicate due to uncommon infrastructure. Despite both the harvester and the truck having IP-connectivity via mobile LTE/3G network, they were unable to exchange identifiers in the following days when the IP-address changed as a result of IP-address pools used by mobile network operators.…”
Section: Things-to-things (T2t) Iot Challengesmentioning
confidence: 99%