Access control in IoT environments: Feasible scenarios - Archive ouverte HAL Access content directly
Conference Papers Year : 2018

Access control in IoT environments: Feasible scenarios

(1) , (1) , (2) , (2, 3) , (4)
1
2
3
4

Abstract

The Internet of Things (IoT) is the extension of the internet to the physical world where all objects collect information and interact with their environments with no or little human intervention. They collect and transfer sensitive and private data from various users. This puts security and privacy issues at the forefront: the ability to manage the digital identity of millions of people and billions of devices is fundamental for success. As most of the information contained in IoT environment may be personal or sensitive data, there is a requirement to support anonymity and restrain access to information. This article will focus on access control and authentication mechanisms as well as supporting the cryptography algorithms in constrained devices.
Fichier principal
Vignette du fichier
ANT-2018.pdf (609.28 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01954066 , version 1 (13-12-2018)

Identifiers

Cite

Yasmina Andaloussi, Driss El Ouadghiri, Yoann Maurel, Jean-Marie Bonnin, Habiba Chaoui. Access control in IoT environments: Feasible scenarios. ANT 2018 - 9th International Conference on Ambient Systems, Networks and Technologies, May 2018, Porto, Portugal. pp.1031-1036, ⟨10.1016/j.procs.2018.04.144⟩. ⟨hal-01954066⟩
184 View
118 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More