Secure and Authenticated Access to LLN Resources Through Policy Constraints

Abstract : Ubiquitous devices comprising several resource-constrained sensors and actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living. Their intrinsic resource limitations however constitute critical requirements, such as security, a great challenge. When these nodes are associated with applications that might have an impact in user’s privacy or even become life threatening, the security issues are of primary concern. Access to these resources should be appropriately controlled to ensure that such wearable nodes are adequately protected. On the other hand, it is very important to not restrict access to only a very closed group of entities. This work presents a service oriented architecture that utilizes policy-based, unified, cross-platform and flexible access control to allow authenticated entities consume the services provided by wearable nodes while protecting their valuable resources.
Type de document :
Communication dans un congrès
Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-9311, pp.271-280, 2015, Information Security Theory and Practice. 〈10.1007/978-3-319-24018-3_18〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01442549
Contributeur : Hal Ifip <>
Soumis le : vendredi 20 janvier 2017 - 16:47:55
Dernière modification le : vendredi 20 janvier 2017 - 16:52:45
Document(s) archivé(s) le : vendredi 21 avril 2017 - 16:11:26

Fichier

978-3-319-24018-3_18_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Konstantinos Rantos, Konstantinos Fysarakis, Othonas Soultatos, Ioannis Askoxylakis. Secure and Authenticated Access to LLN Resources Through Policy Constraints. Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-9311, pp.271-280, 2015, Information Security Theory and Practice. 〈10.1007/978-3-319-24018-3_18〉. 〈hal-01442549〉

Partager

Métriques

Consultations de la notice

39

Téléchargements de fichiers

1