Cargando…

Identity Management for Internet of Things.

The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they inter...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mahalle, Parikshit N.
Otros Autores: Railkar, Poonam N.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Aalborg : River Publishers, 2015.
Colección:River Publishers series in communications.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Half Title; Title; Copyright; Contents; Preface; Acknowledgements; List of Figures; List of Tables; List of Acronyms; 1. Internet of Things Overview; 1.1 Overview; 1.1.1 Internet of Things: Vision; 1.1.2 Emerging Trends; 1.1.3 Economic Significance; 1.2 Technical Building Blocks; 1.2.1 Internet of Things Layered Architecture; 1.2.2 RFID and Internet of Things; 1.2.2.1 EPCIS; 1.2.2.2 ONS; 1.2.3 IP for Things; 1.3 Issues and Challenges; 1.3.1 Design Issues; 1.3.2 Technological Challenges; 1.3.3 Security Challenges; 1.4 Applications; 1.4.1 Manufacturing, Logistic and Relay.
  • 1.4.2 Energy and Utilities1.4.3 Intelligent Transport; 1.4.4 Environmental Monitoring; 1.4.5 Home Management; 1.4.6 eHealth; 1.5 Conclusions; References; 2. Elements of Internet of Things Security; 2.1 Introduction; 2.1.1 Vulnerabilities of IoT; 2.1.2 Security Requirements; 2.1.3 Challenges for Secure Internet of Things; 2.2 Threat Modeling; 2.2.1 Threat Analysis; 2.2.2 Use Cases and Misuse Cases; 2.2.3 Activity Modeling and Threats; 2.2.4 IoT Security Tomography; 2.3 Key Elements; 2.3.1 Identity Establishment; 2.3.2 Access Control; 2.3.3 Data and Message Security.
  • 2.3.4 Non-repudiation and Availability2.3.5 Security Model for IoT; 2.4 Conclusions; Referneces; 3. Identity Management Models; 3.1 Introduction; 3.1.1 Identity Management; 3.1.1.1 Identifiers in IoT; 3.1.1.2 Identification and identifier format; 3.1.2 Identity Portrayal; 3.1.3 RelatedWorks; 3.2 Different Identity Management Models; 3.2.1 Local Identity; 3.2.2 Network Identity; 3.2.3 Federated Identity; 3.2.4 GlobalWeb Identity; 3.3 Identity Management in Internet of Things; 3.3.1 User-centric Identity Management; 3.3.2 Device-centric Identity Management; 3.3.3 Hybrid Identity Management.
  • 3.4 ConclusionsReferences; 4. Identity Management and Trust; 4.1 Introduction; 4.1.1 Motivation; 4.1.2 Trust Management Life Cycle; 4.1.3 State of the Art; 4.2 Identity and Trust; 4.2.1 Third Party Approach; 4.2.2 Public Key Infrastructure; 4.2.3 Attribute Certificates; 4.2.3.1 Binding information; 4.2.3.2 Attribute information; 4.3 Web of Trust Models; 4.3.1 Web Services Security; 4.3.1.1 WS-Security; 4.3.1.2 WS-Security SOAP header; 4.3.1.3 WS-Security authentication mechanisms; 4.3.2 SAML Approach; 4.3.3 Fuzzy Approach for Trust; 4.4 Conclusions; References; 5. Identity Establishment.
  • 5.1 Introduction5.1.1 Mutual Identity Establishment in IoT; 5.1.2 IoT Use Case and Attacks Scenario; 5.1.3 State of the Art; 5.2 Cryptosystem; 5.2.1 Private Key Cryptography; 5.2.2 Public Key Cryptography; 5.3 Mutual Identity Establishment Phases; 5.3.1 Secret Key Generation; 5.3.2 OneWay Authentication; 5.3.3 Mutual Authentication; 5.4 Comparative Discussion; 5.4.1 Security Protocol Verification Tools; 5.4.2 Security Analysis; 5.4.3 Performance Metrics; 5.5 Conclusions; References; 6. Access Control; 6.1 Introduction; 6.1.1 Motivation; 6.1.2 Access Control in Internet of Things.