2018
DOI: 10.1016/j.cose.2018.05.011
|View full text |Cite
|
Sign up to set email alerts
|

Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 12 publications
0
6
0
1
Order By: Relevance
“…With the increasing number of terminals, wireless communication networks are facing great pressure on system security and privacy. Since the number of terminals is huge, the security of the equipment itself cannot be comprehensively guaranteed (Beltrán, 2018). Malicious software and programs can attack the IoT systems to obtain and gain access to identity information, resulting in a significant impact on network security.…”
Section: Figure 1 Relationship Between Product Identification Verification and Authenticationmentioning
confidence: 99%
“…With the increasing number of terminals, wireless communication networks are facing great pressure on system security and privacy. Since the number of terminals is huge, the security of the equipment itself cannot be comprehensively guaranteed (Beltrán, 2018). Malicious software and programs can attack the IoT systems to obtain and gain access to identity information, resulting in a significant impact on network security.…”
Section: Figure 1 Relationship Between Product Identification Verification and Authenticationmentioning
confidence: 99%
“…In particular in the fields of PIoT, IoHT, and IoV involve substantial amounts of sensitive data, making them susceptible to potential privacy harm from indirect communication attacks. To address the potential risk of exploitation in indirect communication, advanced control measures and flexible identity authentication processes may be necessary in certain contexts, according to Beltrán (2018). Strategies like SDP and IAM can prove useful in enhancing data access control and improving identity authentication in complex networked environments, thereby reducing the chances of security breaches associated with indirect communication.…”
Section: Indirect Communicationmentioning
confidence: 99%
“…With a dependable and secure framework for managing user identities, access controls, and authentication mechanisms, IAM can effectively prevent unauthorized access to the cloud and improve security. In one example, the reference in Beltrán (2018) proposed a IAM mechanism, allowing federated and token-based identification, authentication and authorization of IoT agents (mainly smart objects and network devices but also end users via smart objects) to cloud services and applications running on traditional data centers (deployed locally or in the cloud) or on fog computing nodes, i.e. IoT-cloud services.…”
Section: Indirect Communicationmentioning
confidence: 99%
“…Identity and access management systems effectively reduce cloud-based risks, they provide a secure password and digital certificate management [21]. A large number of studies have focused on IAM methods, IAM policies and their execution and overarching access control models in recent years.…”
Section: Literature Surveymentioning
confidence: 99%