Limitations and approaches in access control and identity management for constrained IoT resources

Shantanu Pal*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

The Internet of Things (IoT), smart sensors and mobile wearable devices are helping to provide services that are more ubiquitous, smarter, faster and easily accessible to users. However, security is a significant concern for the IoT, with access control and identity management are being two major issues. With the growing size and presence of these systems and the resource constrained nature of the IoT devices, an important question is how to manage policies in a manner that is both scalable and flexible. In this research, we aim at proposing a fine-grained and flexible access control architecture, and to examine an identity model for constrained IoT resources. To achieve this, first, we outline some key limitations in the state of the art access control and identity management for IoT. Then we devise our approach to address those limitations in a systematic way.

Original languageEnglish
Title of host publication2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019
Subtitle of host publicationPhD Forum on Pervasive Computing and Communications 2019
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages431-432
Number of pages2
ISBN (Electronic)9781538691519
DOIs
Publication statusPublished - 2019
Event2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019 - Kyoto, Japan
Duration: 11 Mar 201915 Mar 2019

Publication series

Name2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019

Conference

Conference2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019
CountryJapan
CityKyoto
Period11/03/1915/03/19

Fingerprint Dive into the research topics of 'Limitations and approaches in access control and identity management for constrained IoT resources'. Together they form a unique fingerprint.

Cite this