2016 International Conference on Inventive Computation Technologies (ICICT) 2016
DOI: 10.1109/inventive.2016.7823267
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of open authentication protocol for IoT based application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Other approaches have used ABAC models, combined in some cases with the second version of the OAuth protocol (OAuth 2.0) or the Constrained Application Protocol (CoAP), to protect access to the data [12,13]. The authors of [14] propose an approach targeting HTTP/CoAP services to provide an authorization framework that can be integrated by invoking an external OAuth-based Authorization Service (OAS).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Other approaches have used ABAC models, combined in some cases with the second version of the OAuth protocol (OAuth 2.0) or the Constrained Application Protocol (CoAP), to protect access to the data [12,13]. The authors of [14] propose an approach targeting HTTP/CoAP services to provide an authorization framework that can be integrated by invoking an external OAuth-based Authorization Service (OAS).…”
Section: Related Workmentioning
confidence: 99%
“…This makes it easy to integrate in any device. On the other hand, the use of HTTP or CoAP makes the communication extremely light [12,13]. Therefore, this approach meets the computational restrictions that the Device imposes.…”
Section: The Iot Devicementioning
confidence: 99%
“…Through the support of innovative start-ups, small and medium-sized enterprises (SMEs), and farmers, ATLAS enables new business models for the farmers and establishes sustainable business ecosystems based on innovative data-driven services. In parallel, the establishment of a Representational State Transfer (REST) architecture as the best standard to design and deploy internet of things applications (IoT apps) in servercloud environments [27,28], in combination with secure transfer protocols, such as OAuth 2 (Open Authorization) [29], has rendered the interconnection and interoperability between IoT apps fast, reliable, and secure.…”
Section: Introductionmentioning
confidence: 99%
“…With regard to IoT some approaches have used ABAC models, combined in some cases with the second version of the OAuth protocol (OAuth2) or the Constrained Application Protocol (CoAP), to protect the access to data [4] [5].…”
Section: Introductionmentioning
confidence: 99%