Proceedings of the ACM International Conference on Computing Frontiers 2016
DOI: 10.1145/2903150.2911710
|View full text |Cite
|
Sign up to set email alerts
|

New directions in IoT privacy using attribute-based authentication

Abstract: The Internet of Things (IoT) is a ubiquitous system that incorporates not only the current Internet of computers, but also smart objects and sensors. IoT technologies often rely on centralised architectures that follow the current business models. This makes e cient data collection and processing possible, which can be beneficial from a business perspective, but has many ramifications for users privacy. As communication within the IoT happens among many devices from various contexts, they need to authenticate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(21 citation statements)
references
References 21 publications
0
21
0
Order By: Relevance
“…They are also illustrated in Figure 1. ("Internet of Things" OR "IoT") AND "Security" AND ("Authentication" OR "Authorization" OR "Identity" OR "Access control") AND NOT ("Network" OR "Hardware" OR "RFID" OR "Protocol" OR "Cryptography" OR "Survey" OR "Study") IEEE Xplore (("Abstract": "Internet of Things" OR "Abstract": "IoT") AND ("Abstract": "Authentication" OR "Abstract": "Authorization" OR "Abstract": "Identity" OR "Abstract":"Access Control") AND "Index Terms": "Security" AND NOT(Search Index Terms: "Network" OR "Abstract": "Hardware" OR "Abstract": "Cryptography" OR "Abstract": "Protocol" OR "Document Title": "Survey" OR "Abstract": "RFID" OR "Document Title":"Study")) ACM DL recordAbstract:(IoT "Internet Of Things") AND recordAbstract:(Authentication Authorization Identity "Access Control" -Hardware -Cryptography -Protocol -RFID) AND acmdlTitle:(-Study -Survey) AND keywords.author.keyword:(-Hardware -Physical -Network) WoS ("internet of things" OR IoT) AND TOPIC: (Security) AND TOPIC: (Authentication OR Authorization OR Identity OR "Access Control") NOT TOPIC: (Hardware OR Cryptography OR Protocol OR RFID OR Physical OR Network) NOT TOPIC: (Study OR Survey) SpringerLink (Authentication OR Authorization OR Identity OR "Access Control") + title ("Internet of Things" OR IoT) ScienceDirect TITLE-ABSTR-KEY("Internet of Things" OR "IoT") AND TITLE-ABSTR-KEY(Authentication OR Authorization OR Identity OR "Access Control") AND KEY(Security) AND NOT (TITLE-ABSTR-KEY(Hardware OR Cryptography OR Protocol OR RFID) OR title(study OR survey) OR key(Physical OR Network)) (viii) healthcare: projects that specifically address the healthcare domain [18,22,28,32,41,53] (ix) attribute-based subset of authorization proposals that involve ABAC [15,28,32,34,38,53] (x) roles: subset of authorization proposals that involve RBAC [18,28,29] Two of the papers do not fit into any of the above categories [55,56]. One article [55] is likely too short for RAKE to perform any meaningful analysis; with the second article [56], we do not identify any obvious reason for not being categorized.…”
Section: Taxonomymentioning
confidence: 99%
See 4 more Smart Citations
“…They are also illustrated in Figure 1. ("Internet of Things" OR "IoT") AND "Security" AND ("Authentication" OR "Authorization" OR "Identity" OR "Access control") AND NOT ("Network" OR "Hardware" OR "RFID" OR "Protocol" OR "Cryptography" OR "Survey" OR "Study") IEEE Xplore (("Abstract": "Internet of Things" OR "Abstract": "IoT") AND ("Abstract": "Authentication" OR "Abstract": "Authorization" OR "Abstract": "Identity" OR "Abstract":"Access Control") AND "Index Terms": "Security" AND NOT(Search Index Terms: "Network" OR "Abstract": "Hardware" OR "Abstract": "Cryptography" OR "Abstract": "Protocol" OR "Document Title": "Survey" OR "Abstract": "RFID" OR "Document Title":"Study")) ACM DL recordAbstract:(IoT "Internet Of Things") AND recordAbstract:(Authentication Authorization Identity "Access Control" -Hardware -Cryptography -Protocol -RFID) AND acmdlTitle:(-Study -Survey) AND keywords.author.keyword:(-Hardware -Physical -Network) WoS ("internet of things" OR IoT) AND TOPIC: (Security) AND TOPIC: (Authentication OR Authorization OR Identity OR "Access Control") NOT TOPIC: (Hardware OR Cryptography OR Protocol OR RFID OR Physical OR Network) NOT TOPIC: (Study OR Survey) SpringerLink (Authentication OR Authorization OR Identity OR "Access Control") + title ("Internet of Things" OR IoT) ScienceDirect TITLE-ABSTR-KEY("Internet of Things" OR "IoT") AND TITLE-ABSTR-KEY(Authentication OR Authorization OR Identity OR "Access Control") AND KEY(Security) AND NOT (TITLE-ABSTR-KEY(Hardware OR Cryptography OR Protocol OR RFID) OR title(study OR survey) OR key(Physical OR Network)) (viii) healthcare: projects that specifically address the healthcare domain [18,22,28,32,41,53] (ix) attribute-based subset of authorization proposals that involve ABAC [15,28,32,34,38,53] (x) roles: subset of authorization proposals that involve RBAC [18,28,29] Two of the papers do not fit into any of the above categories [55,56]. One article [55] is likely too short for RAKE to perform any meaningful analysis; with the second article [56], we do not identify any obvious reason for not being categorized.…”
Section: Taxonomymentioning
confidence: 99%
“…In [15], the authors suggest enhancing privacy during authentication by basing authentication on attributes, rather than identities. A trusted authority issues certificates which prove that an entity possesses a particular attribute; these certificates are used for authentication when communicating with other services.…”
Section: Authentication Authentication Is Addressed By 22 Papersmentioning
confidence: 99%
See 3 more Smart Citations