The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Open authorization (OAuth) is an open protocol, which allows secure authorization in a simple and standardized way from third-party applications accessing online services, based on the representational state transfer (REST) web architecture. OAuth has been designed to provide an authorization layer, typically on top of a secure transport layer such as HTTPS. The Internet of Things (IoTs) refers to...
Nowadays, the Internet of Things is able to provide more advanced services to people, which connects a variety of devices, systems and applications. However, it covers a variety of devices, protocols and applications, which makes it much more complex. In the main application areas, wireless sensor networks with a frequent but short communication character, it requires an efficient and flexible protocol...
This paper presents security requirements, risk survey, security objectives, and security controls of the Bluetooth Low Energy (BLE) based Catcher devices and the related Microdata Ecosystem of Ceruus company for a secure, energy efficient and scalable wireless content distribution. The system architecture was composed of the Mobile Cellular Network (MCN) based gateway/edge router device, such as...
Internet into our physical world and making it present everywhere. This evolution is also raising challenges in issues such as privacy, and security. For that reason, this work is focused on the integration and lightweight adaptation of existing authentication protocols, which are able also to offer authorization and access control functionalities. In particular, this work is focused on the Extensible...
In this paper, the Security Petri Net model is adopted to formally prove security protocol in the field of wireless sensor networks. As a result of this analysis, a man-in-the-middle-attack has been found and an improved version of the protocol is proposed. And the results show that the Security Petri Net model is a simple and efficient method to prove the security of of security protocol.
The security issues of the Internet of Things (IoT) are directly related to the wide application of its system. Beginning with introducing the architecture and features of IoT security, this paper expounds several security issues of IoT that exist in the three-layer system structure, and comes up with solutions to the issues above coupled with key technologies involved. Among these safety measures...
This paper focuses on node authentication in Internet of Things. Firstly the related works are introduced. Then the principles of Elliptic Curve Cryptosystem are described. After that, embedding of ECC into RFID and WSN is discussed. Finally a conclusion is drawn that ECC replaces other public cryptosystems in IoT is an inevitable trend because of its high efficiency and short key length.
Authentication and Identity Management help to protect resources and justify trust in "bona fide" operation by service client and service provider. Besides, identity management can support hardware assisted integrity protection. In the Internet of Things (IoT), the high number of lightweight devices requires scalable and lightweight solutions to trust management. The paper proposes a framework...
Internet of Things is gaining momentum in industrial automation environments. The objectives of the EU project IoT@Work are to transfer Internet of Things approaches to industrial automation environments and to develop mechanisms and protocols to enable plug & work of devices. Identification of things or devices as part of a network, service, or application in a secure manner is one of the...
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
This article describes the design, implementation and evaluation of a trustful infrastructure for the Internet of Things (IoT) based on EPOS Mote. The infrastructure was built around EPOS' second generation of motes, which features an ARM processor and an IEEE 802.15.4 radio transceiver. It is presented to end users through a trustful communication protocol stack compatible with TCP/IP. Trustfulness...
Future Internet of Things requires mobility support for extending and adapting the network to changes of location and infrastructure, increases the fault tolerance capacity, connectivity, dependability and scalability. The current Future Internet architectures are based on ID/Locator split to support the mobility, but these approaches are not, on the one hand, considering the security needs for the...
This paper presents a new approach for secure networking in the Internet of Things. To ensure privacy, we designed an adaptation of the recently IRTF standardized HIP protocol, for RFID communication. Tag identity is protected by a negotiated equation. Two approaches are discussed: brute force based on digest procedures, and hash tree. HIP-Tag concept has been recently adopted by the IRTF as a working...
This paper depicts the current situation of the development of the Internet of Things(IoT). RFID system is vulnerable to various attacks, because there is no physical or visible contact in its communication process. The research on security and privacy domain also increasingly causes the attention of academia. And this paper is mainly underlined that security and privacy issues exist ubiquitously,...
Recently the problem of providing effective and appropriate healthcare to elderly and disable people is an important field in relative to the aging of population problems. The objective of information and communication technologies (ICT) is to focus on the new technologies the medical environments, so that it can provide management to accelerate and improve the clinical process. Our contribution is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.