Abstract
This chapter focuses on access control, authentication techniques, and their related aspects with respect to the Internet of Things (IoT). Access control is for managing interaction and communication between users and systems. Authentication is a way of proving the identity of an entity and implemented on various layers of the IoT framework, e.g., physical or perception layer, transportation, and application layer. In the context of IoT, access control and authentication must address the issues of heterogeneity and scalability in addition to the energy and efficiency issues. The primary focus of this chapter is to target the connectivity of IoT devices. We start with the description of communication architecture of IoT, keeping security concerns in mind. For detailed comprehension, security aspects are discussed for each layer of IoT including RFID and sensor networks to traditional server-based computing. To understand the requirements of IoT systems, we compare the IoT paradigm with traditional ubiquitous computing models. Focusing on the connectivity between devices and connectivity with fixed server/cloud-based servers is the main aim of this chapter. In this context, the emphasis is on detailing and evaluating the state of the art of access and control mechanisms. To help the reader to address the significant research problems in the area, we have included open research directions related to authentication and access control mechanisms in the IoT.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gartner (2015), Gartner Says a thirty-fold increase in internet-connected physical devices by 2020 will significantly alter how the supply chain operates. http://www.gartner.com/newsroom/id/2688717. Accessed 12 June 2015
Holler J, Tsiatsis V, Mulligan C, et al (2014) From machine to machine to internet of things. Academic press, Elsevier, Oxford, UK
IoT (2015) IoT-ARM white paper. www.iot-a.eu. Accessed 12 June 2015
ETSI (2015) ETSI technical specification v 2.1.1. http://www.etsi.org. Accessed 17 June 2015
SENSEI (2015) SENSEI white papers. http://www.sensei-project.eu. Accessed 12 June 2015
ITU (2015) ITU Joint Coordination Activity on Internet of Things (JCA-IoT) white papers. www.itu.int. Accessed 12 June 2015
Open Geospatial Consortium (20115) Open geospatial consortium architecture. www.opengeospatial.org/pub/www/saa/saa_architecture.html. Accessed 17 June 2015
RFID (2015) RFIDs uniform coding. http://www.epc-rfid.info/tbd-1. Accessed 15 June 2015
Matt B, Joan F, John I, Angelos DK (2015) Trust management. http://www.cs.yale.edu/~jf/BFIK-SIP.pdf. Accessed 15 June 2015
Thales, (2015), Key management. https://www.thales-esecurity.com/solutions/by-technology-focus/key-management. Accessed 12 June 2015
Jing Q, Athanasios V et al (2014) Security of the internet of things: perspective and challenges. Wirel Netw 20(8):2481–2501, Springer US
Thales (2015) Hardware based scheme. https://www.thales-esecurity.com/products-and-services/products-and-services/hardware-security-modules. Accessed 12 June 2015
Granjal J, Monteiro E, De Silva J (2013) Security issues and wireless M2M systems, Wireless Networks and Security. Springer, Heidelberg, pp 133–164
Trung N (2015) A survey of WiMAX security threats project report. http://www.cse.wustl.edu/~jain/cse571-09/ftp/wimax2/. Accessed 17 June 2015
Stephen N (2015) Traffic analysis. http://www.sans.edu/research/security-laboratory/article/traffic-analysis. Accessed 12 June 2015
Dunkels A, Alonso J, Voigt T and Ritter H (2004) Distributed TCP caching for wireless sensor networks. Proceedings of 2004 modeling and optimization in mobile, Ad Hoc and wireless Networks, Cambridge, UK
Iyer YG, Gandham S, Venkatesan S (2005) STCP: a generic transport layer protocol for wireless sensor networks. Proceedings of 14th International Conference ICCCN 2005, pp 449–454
Yusung K, Kilnam C, Lisong XU (2008) Adjusting the aggregate throughput of parallel TCP flows without central coordination. IEICE Trans Commun 5:1615–1618, E91-B
Wan CY, Campbell AT, Krishnamurthy L (2005) Pump-slowly, fetch-quickly (PSFQ): a reliable transport protocol for sensor networks. IEEE J Sel Areas Commun 23(4):862–872
Shelby Z, Hartke K, Bormann C (2014) The Constrained Application Protocol (CoAP), request for comments: 7252. Internet Engineering Task Force (IETF)
Stankovic JA (2014) Research directions for the internet of things. IEEE J Internet Things 1(1):3–9
Sun K, Yin L (2014) Attribute-role-based hybrid access control in the internet of things. In: Proceedings of workshop on APWeb 2014. Changsha, China, Springer LNCS 8710, pp 333–343
Mahalle PN, Anggorojati B et al (2014) Identity establishment and capability Based access control scheme for internet of things. In: Proceedings of 2009 12th international symposium on Wireless Personal Multimedia Communications (WPMC), Sendai, Japan, pp 187–191
Liu J, Xiao Y, Philip CL (2012) Authentication and access control in the internet of things. In: Proceedings of 2012 32nd International conference on distributed computing systems workshops, Macau, China, pp 588–592
Zhang G, Tian J (2010) An extended role based access control model for the internet of things. In: Proceedings of 2010 International Conference on Information, Networking and Automation (ICINA), Kunming, China, vol 1, pp 319–323
Fremantle P, Aziz B et al. (2014) Federated identity and access management for the internet of things. In: Proceedings of 2014 I.E. international workshop on secure internet of things, Wroclaw, Poland, pp 10–17
Sitenkov D (2014) Access control in the internet of things. Master’s thesis; SICS
Liu L, Yin L et al (2014) EAC: a framework of authentication property for the IoTs. In: Proceedings of 2014 international conference on cyber-enabled distributed computing and knowledge discovery, Shanghai, China, pp 102–105
Pereira PP, Eliasson J, Delsing J (2014) An authentication and access control framework for CoAP-based internet of things. Proc 40th 2014 IECON, Dallas, US, pp 5293–5299
Mituca A, Moin HA, Prehofer C (2014) Access control for apps running on constrained devices in the internet of things. In: Proceedings of 2014 international workshop on secure internet of things, pp 1–9
Thuan DV, Butkus P, Thanh DV (2014) A user centric identity management for internet of things. In: Proceedings of 2014 international conference on IT convergence and security, pp 1–4
Banerjee D, Dong B et al (2014) Privacy-preserving channel access for internet of things. IEEE Internet Things J 1(5):430–445
Hummen R, Shafagh H et al. (2014) Delegation based authentication and authorization for the IP-based internet of things. In: Proceedings of 2014 I.E. international conference on Sensing, Communication and Networking (SECON), pp 284–292
Gerdes S, Bergmann O, Bormann C (2014) Delegated authentication authorization for constrained environments. In: Proceedings of IEEE 22nd international conference on network protocols, pp 654–659
Ning H, Liu H, Yang TL (2013) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 26(3):657–667
Hernandez-Ramos LJ, Pawlowski PM (2015) Toward a lightweight authentication and authorization framework for smart objects. IEEE J Sel Areas Commun 33(4):690–702
Lai C, Li H et al (2014) CPAL: a conditional privacy-preserving authentication with access linkability for roaming service. IEEE Internet Things J 1(1):46–57
Jan AM, Nanda P et al. (2014) A robust authentication scheme for observing resources in the internet of things environment. In: IEEE 13th International conference on trust, security and privacy in computing and communication, pp 205–211
Raheem A, Lasebae A, Loo J (2014) A secure authentication protocol for IP-based wireless sensor communications using the Location/ID Split Protocol (LISP). In: Proceedings of IEEE 13th international conference on trust, security and privacy in computing and communication, pp 840–845
Pawlowski PM, Jara JA and Ogorzalek JM et al. (2015) EAP for IoT:more efficient transport of authentication data- TEPANOM case study. In: Proceedings of 2015 29th international conference on advanced information networking and applications workshop, pp 694–699
Druml N, Menghin M, et al (2014) A flexible and lightweight ECC-based authentication solution for resource constrained systems. In: Proceeding of 2014 17th Euromicro conference on digital system design, pp 372–378
Schukat M, Flood P (2014) Zero-knowledge proofs in M2M communication. In: Proceedings of ISSC 2014/CHCT 2014, pp 269–273
Flood P, Schukat M (2014) Peer to peer authentication for small embedded systems. In: Proceedings of 10th international conference on digital technology, pp 68–72
Porambage P, Schmitt C et al (2014) Two phase authentication protocol for wireless sensor networks in distributed IoT applications. In: Proc IEEE WCNC 2014, pp 2728–2733
Yao X, Han X et al (2013) A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sensors J 13(10):3693–3701
Kothmayr T, Schmitt C et al (2012) A DTLS based end-to-end security architecture for the internet of things with two-way authentication. In: Proceedings of 2012 37th local computer network workshop, pp 956–963
Lee JY, Lin W, Huang Y (2014) A lightweight authentication protocol for internet of things. In: Proceedings of 2014 international symposium on next generation electronics, pp 1–2
Mahalle NP, Prasad RN, Prased R (2014) Threshold cryptography based group authentication scheme for internet of things. In: Proceedings of 2014 4th international conference on aerospace & electronic systems, pp 1–5
Adiga BS, Balamuralidhar P et al. (2012) An identity based encryption using Elliptic curve cryptography for secure M2M communication. In: Proceedings of 2012 SecurIT, pp 68–74
Liao Y, Hsiao C (2013) A secure ECC-based RFID authentication scheme using hybrid protocols. Adv Intell Syst Appl 2(21):1–13
Liao Y, Hsiao C (2014) A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw 18:133–146
Chou J (2014) An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput 70(1):75–94
Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57:2266–2279
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ranjan, A.K., Somani, G. (2016). Access Control and Authentication in the Internet of Things Environment. In: Mahmood, Z. (eds) Connectivity Frameworks for Smart Devices. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-33124-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-33124-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-33122-5
Online ISBN: 978-3-319-33124-9
eBook Packages: Computer ScienceComputer Science (R0)