2020
DOI: 10.21203/rs.3.rs-66793/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Survey on Identity and Access Management for Internet of Things

Abstract: The Internet of Things (IoT) encompasses a large number of connected devices, generating and sharing different types of data among themselves. These data enable the creation of society-changing applications, such as health monitoring and autonomous vehicles. Under this context, protecting the access of these connected devices and their data is critical to IoT applications’ success, since a single data breach can incur into a cascade effect, which leads to devastating consequences. Identity and Access Management … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 75 publications
0
2
0
2
Order By: Relevance
“…O [Cremonezi et al 2019] propõe o uso de armazenamento nos nós da rede usando as identidades como servic ¸os e os objetos são persistidos por meio de políticas de cache conhecidas. Ele avalia a distribuic ¸ão em diferentes capacidades de armazenamento e comprovam que os algoritmos probabilísticos possuem um desempenho melhor que os demais.…”
Section: Discussionunclassified
See 1 more Smart Citation
“…O [Cremonezi et al 2019] propõe o uso de armazenamento nos nós da rede usando as identidades como servic ¸os e os objetos são persistidos por meio de políticas de cache conhecidas. Ele avalia a distribuic ¸ão em diferentes capacidades de armazenamento e comprovam que os algoritmos probabilísticos possuem um desempenho melhor que os demais.…”
Section: Discussionunclassified
“…Ele avalia a distribuic ¸ão em diferentes capacidades de armazenamento e comprovam que os algoritmos probabilísticos possuem um desempenho melhor que os demais. Este trabalho surgiu da necessidade de verificar melhor os algoritmos de replicac ¸ões e substituic ¸ões sugerido em [Cremonezi et al 2019]. A pesquisa foi evoluída usando uma entrada de dados real, antes era uma entrada simulada pela distribuic ¸ão Zipf.…”
Section: Discussionunclassified
“…Therefore, these two tasks are seen as authentication and authorization of entities in the system. As mentioned in the work of [20], the authentication methods can use different factors for human and non-human such as knowledge factor, possession factor, inherence factor and contextaware factor. The authorization methods can be classified as: Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Capability-Based Access Control (Cap-BAC).…”
Section: Background and Related Work 21 Identity Management And Acces...mentioning
confidence: 99%
“…In addition, security analyses have been conducted on a number of mainstream IAM attacks, such as a man-in-the-middle attacks, insider attacks, replay attacks, and session/cookie attacks. Cremonezi et al [17], conducted a survey study on conventional IAM systems covering AuthN, AuthZ operations, and IAM models in IoT environments, where the IoT system architecture and characteristics are considered. Other researchers have conducted studies on the AuthZ part of IAM for IoT.…”
Section: Related Workmentioning
confidence: 99%