2017 International Workshop on Secure Internet of Things (SIoT) 2017
DOI: 10.1109/siot.2017.00006
|View full text |Cite
|
Sign up to set email alerts
|

Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment

Abstract: Abstract-In this paper we propose a new authorization and authentication framework for the IoT that combines the security model of OAuth 1.0a with the lightweight building blocks of ACE. By designing self-securing tokens the security of the framework no longer depends on the security of the network stack. We use basic PKI functionalities to bootstrap a chain-of-trust between the devices which simplifies future token exchanges. Finally, we propose an alternate key establishment scheme for use cases where device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 5 publications
0
12
0
Order By: Relevance
“…To solve the problems related to key exchange, we propose to use ECIES (Elliptic Curve Integrated Encryption Scheme) [41]. It is an authenticated public key cryptography system that aims at generating a secret key for onetime use by both parties of a communication.…”
Section: Implementation Of Secure Exchange Of Contextmentioning
confidence: 99%
“…To solve the problems related to key exchange, we propose to use ECIES (Elliptic Curve Integrated Encryption Scheme) [41]. It is an authenticated public key cryptography system that aims at generating a secret key for onetime use by both parties of a communication.…”
Section: Implementation Of Secure Exchange Of Contextmentioning
confidence: 99%
“…This prevents cloning, intrusion and replacement by illegitimate devices. For example, in (Claeys et al, 2017), authors proposed a new authentication technique based on OAuth1.0a and ACE (Authentication and Authorization for Constrained Environments). In this solution, a cryptographic protocol EDHOC (Ephemeral Diffie Hellman over Cose (Concise Object Signing and Encryption (Bormann and Hoffman, 2013;Schaad, 2016)) (Selander et al, 2016) is used for authentication.…”
Section: Research Directionsmentioning
confidence: 99%
“…Several variants of these mechanisms have been implemented and have proven their effectiveness. For example, in (Claeys et al, 2017), a token-based secure access control system is implemented. The main advantage of such a system is that it can be used in unsecured network environments.…”
Section: Research Directionsmentioning
confidence: 99%
See 2 more Smart Citations