Cargando…

Identity Management for Internet of Things.

The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they inter...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mahalle, Parikshit N.
Otros Autores: Railkar, Poonam N.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Aalborg : River Publishers, 2015.
Colección:River Publishers series in communications.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn957125082
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 160827s2015 xx ob 001 0 eng d
010 |a  2015429434 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d OCLCQ  |d CCO  |d OCLCO  |d MERUC  |d LOA  |d COCUF  |d K6U  |d PIFAG  |d FVL  |d OCLCQ  |d ZCU  |d U3W  |d WRM  |d STF  |d OCLCF  |d ICG  |d VT2  |d OCLCQ  |d WYU  |d TKN  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d TYFRS  |d UKAHL  |d OCLCQ  |d OCLCO 
019 |a 1055325192  |a 1066634182  |a 1081225612  |a 1228562235  |a 1372504686  |a 1385484636  |a 1391454745  |a 1397491584  |a 1401067492 
020 |a 9788793102910 
020 |a 8793102917 
020 |a 8793102909 
020 |a 9788793102903 
020 |a 9781003338505  |q (electronic bk.) 
020 |a 100333850X  |q (electronic bk.) 
020 |a 9781000795400  |q (electronic bk. : PDF) 
020 |a 1000795403  |q (electronic bk. : PDF) 
020 |a 9781000792713  |q (electronic bk. : EPUB) 
020 |a 1000792714  |q (electronic bk. : EPUB) 
024 7 |a 10.1201/9781003338505  |2 doi 
029 1 |a CHNEW  |b 000960808 
029 1 |a CHVBK  |b 491676328 
029 1 |a DEBBG  |b BV044060932 
035 |a (OCoLC)957125082  |z (OCoLC)1055325192  |z (OCoLC)1066634182  |z (OCoLC)1081225612  |z (OCoLC)1228562235  |z (OCoLC)1372504686  |z (OCoLC)1385484636  |z (OCoLC)1391454745  |z (OCoLC)1397491584  |z (OCoLC)1401067492 
037 |a 9781003338505  |b Taylor & Francis 
050 4 |a QA76.5915  |b .M343 2015eb 
072 7 |a QA  |2 lcco 
072 7 |a SCI  |x 024000  |2 bisacsh 
072 7 |a TEC  |x 041000  |2 bisacsh 
072 7 |a TJK  |2 bicssc 
082 0 4 |a 004.678  |2 23 
049 |a UAMI 
100 1 |a Mahalle, Parikshit N. 
245 1 0 |a Identity Management for Internet of Things. 
260 |a Aalborg :  |b River Publishers,  |c 2015. 
300 |a 1 online resource (185 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a River Publishers Series in Communications 
588 0 |a Print version record. 
505 0 |a Cover; Half Title; Title; Copyright; Contents; Preface; Acknowledgements; List of Figures; List of Tables; List of Acronyms; 1. Internet of Things Overview; 1.1 Overview; 1.1.1 Internet of Things: Vision; 1.1.2 Emerging Trends; 1.1.3 Economic Significance; 1.2 Technical Building Blocks; 1.2.1 Internet of Things Layered Architecture; 1.2.2 RFID and Internet of Things; 1.2.2.1 EPCIS; 1.2.2.2 ONS; 1.2.3 IP for Things; 1.3 Issues and Challenges; 1.3.1 Design Issues; 1.3.2 Technological Challenges; 1.3.3 Security Challenges; 1.4 Applications; 1.4.1 Manufacturing, Logistic and Relay. 
505 8 |a 1.4.2 Energy and Utilities1.4.3 Intelligent Transport; 1.4.4 Environmental Monitoring; 1.4.5 Home Management; 1.4.6 eHealth; 1.5 Conclusions; References; 2. Elements of Internet of Things Security; 2.1 Introduction; 2.1.1 Vulnerabilities of IoT; 2.1.2 Security Requirements; 2.1.3 Challenges for Secure Internet of Things; 2.2 Threat Modeling; 2.2.1 Threat Analysis; 2.2.2 Use Cases and Misuse Cases; 2.2.3 Activity Modeling and Threats; 2.2.4 IoT Security Tomography; 2.3 Key Elements; 2.3.1 Identity Establishment; 2.3.2 Access Control; 2.3.3 Data and Message Security. 
505 8 |a 2.3.4 Non-repudiation and Availability2.3.5 Security Model for IoT; 2.4 Conclusions; Referneces; 3. Identity Management Models; 3.1 Introduction; 3.1.1 Identity Management; 3.1.1.1 Identifiers in IoT; 3.1.1.2 Identification and identifier format; 3.1.2 Identity Portrayal; 3.1.3 RelatedWorks; 3.2 Different Identity Management Models; 3.2.1 Local Identity; 3.2.2 Network Identity; 3.2.3 Federated Identity; 3.2.4 GlobalWeb Identity; 3.3 Identity Management in Internet of Things; 3.3.1 User-centric Identity Management; 3.3.2 Device-centric Identity Management; 3.3.3 Hybrid Identity Management. 
505 8 |a 3.4 ConclusionsReferences; 4. Identity Management and Trust; 4.1 Introduction; 4.1.1 Motivation; 4.1.2 Trust Management Life Cycle; 4.1.3 State of the Art; 4.2 Identity and Trust; 4.2.1 Third Party Approach; 4.2.2 Public Key Infrastructure; 4.2.3 Attribute Certificates; 4.2.3.1 Binding information; 4.2.3.2 Attribute information; 4.3 Web of Trust Models; 4.3.1 Web Services Security; 4.3.1.1 WS-Security; 4.3.1.2 WS-Security SOAP header; 4.3.1.3 WS-Security authentication mechanisms; 4.3.2 SAML Approach; 4.3.3 Fuzzy Approach for Trust; 4.4 Conclusions; References; 5. Identity Establishment. 
505 8 |a 5.1 Introduction5.1.1 Mutual Identity Establishment in IoT; 5.1.2 IoT Use Case and Attacks Scenario; 5.1.3 State of the Art; 5.2 Cryptosystem; 5.2.1 Private Key Cryptography; 5.2.2 Public Key Cryptography; 5.3 Mutual Identity Establishment Phases; 5.3.1 Secret Key Generation; 5.3.2 OneWay Authentication; 5.3.3 Mutual Authentication; 5.4 Comparative Discussion; 5.4.1 Security Protocol Verification Tools; 5.4.2 Security Analysis; 5.4.3 Performance Metrics; 5.5 Conclusions; References; 6. Access Control; 6.1 Introduction; 6.1.1 Motivation; 6.1.2 Access Control in Internet of Things. 
500 |a 6.1.3 Different Access Control Schemes. 
504 |a Includes bibliographical references at the end of each chapters and index. 
520 |a The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include: Internet of Things; Identity Management; Identity models in Internet of Things; Identity management and trust in the Internet of Things context; Authentication and access control;Identitymanagement for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identitymanagement and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control. 
545 0 |a Parikshit N. Mahalle, Poonam N. Railkar 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Internet of things. 
650 0 |a Ubiquitous computing  |x Security measures. 
650 0 |a Computers  |x Access control. 
650 6 |a Internet des objets. 
650 6 |a Informatique omniprésente  |x Sécurité  |x Mesures. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a SCIENCE / Energy  |2 bisacsh 
650 7 |a TECHNOLOGY / Telecommunications  |2 bisacsh 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Internet of things  |2 fast 
700 1 |a Railkar, Poonam N. 
776 0 8 |i Print version:  |a Mahalle, Parikshit N.  |t Identity Management for Internet of Things.  |d Aalborg : River Publishers, ©2015  |z 9788793102903 
830 0 |a River Publishers series in communications. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4509473  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH40583864 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4509473 
994 |a 92  |b IZTAP