2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2019
DOI: 10.1109/dsn.2019.00034
|View full text |Cite
|
Sign up to set email alerts
|

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 30 publications
0
12
0
Order By: Relevance
“…Chen et al [68] studied the security challenges in IoT remote blinding. They used a state-machine model to evaluate ten real-world remote binding cases.…”
Section: Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…Chen et al [68] studied the security challenges in IoT remote blinding. They used a state-machine model to evaluate ten real-world remote binding cases.…”
Section: Access Controlmentioning
confidence: 99%
“…More devices can handle computing and data storage missions to cloud services. To check their security issues, researchers have studies access control models in remote binding [68], IFTTT (if this then that) services [65], and resource sharing [67]. As more vendors develop mobile apps to control their devices, the access control issues in these apps are also worthy of attention.…”
Section: Application Layermentioning
confidence: 99%
“…In addition, they share their IoT devices, such as smart TVs and smart speakers, for altruistic or economic reasons. Although a single user can link to and use multiple devices, a single device cannot be linked to multiple user accounts (the IoT cloud revokes an existing binding when it receives a new binding request) [29,200]. In existing IoT frameworks, IoT devices are either shared with everyone (e.g.…”
Section: Motivationmentioning
confidence: 99%
“…When a user clicks "Add Device" on the mobile app, a device binding process kicks off. DIAM-IoT is agnostic to the underlying device binding approaches and a variety of protocols [5] implemented by device manufactures can be utilized in practice.…”
Section: Device Binding and Verifiable Credential Generationmentioning
confidence: 99%
“…3.7.1 Phase 1 -Resolving Device DID. Once Bob obtains the DID did dev of Alice's IoT device 5 , he invokes the master smart contract sc mas . Based on the resolution of did dev , sc mas further invokes the corresponding manufacture smart contract sc mas to get the tuple ⟨did dev , H(doc dev ), URI doc dev , sta did dev ⟩.…”
Section: Decentralized and User-centric Data Authorizationmentioning
confidence: 99%