2017 IEEE Symposium on Computers and Communications (ISCC) 2017
DOI: 10.1109/iscc.2017.8024606
|View full text |Cite
|
Sign up to set email alerts
|

OAuth-IoT: An access control framework for the Internet of Things based on open standards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0
6

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(49 citation statements)
references
References 10 publications
0
37
0
6
Order By: Relevance
“…However, this should be considered malicious behavior from the viewpoint of device security. Therefore, we propose a verifiable mechanism to reconstruct the access tree and remove the collaborative node {Manager} from the tree and modify the threshold value from (2, 3) to (1,2). Obviously, the device cannot satisfy the new access tree and is not allowed to request collaboration.…”
Section: Verifiable and Controlled Collaborationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this should be considered malicious behavior from the viewpoint of device security. Therefore, we propose a verifiable mechanism to reconstruct the access tree and remove the collaborative node {Manager} from the tree and modify the threshold value from (2, 3) to (1,2). Obviously, the device cannot satisfy the new access tree and is not allowed to request collaboration.…”
Section: Verifiable and Controlled Collaborationmentioning
confidence: 99%
“…The Internet of Things (IoT) has emerged as a revolutionary type of technology that connects all smart devices together through a distributed capillary networking infrastructure. It enables IoT smart devices to collect and share data more efficiently and autonomously [1], making changes in every corner of our daily lives, including healthcare, transport, environment, energy, business, and culture [2]. Although IoT is promising, security and privacy have been two major issues that have become a bottleneck impeding the application of IoT technology in open environments, where IoT devices are connected to the internet and exposed to unauthorized access [3].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, Sciancalepore et al propose a different authorization framework for the IoT [20], also based on OAuth 2.0 and other standard protocols. In particular, it provides access control through an intermediary gateway acting as mediator between IoT networks and non-constrained Internet segments.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, it provides access control through an intermediary gateway acting as mediator between IoT networks and non-constrained Internet segments. However, unlike the ACE framework, [20] displays a considerably higher level of complexity and requires the intermediary gateway to be fully trusted.…”
Section: Related Workmentioning
confidence: 99%
“…OAuth 2.0 is a standard protocol that can be supported by a range of technologies and programming languages [27]. This makes it easy to integrate in any device.…”
Section: The Iot Devicementioning
confidence: 99%