New Paradigms for Access Control in Constrained Environments - Archive ouverte HAL Access content directly
Conference Papers IEEE Xplore Year : 2014

New Paradigms for Access Control in Constrained Environments

Abdelkarim Cherkaoui
  • Function : Author
  • PersonId : 919817
Lilian Bossuet
  • Function : Author
  • PersonId : 885906
L. Seitz
  • Function : Author
G. Selander
  • Function : Author
R. Borgaonkar
  • Function : Author

Abstract

The Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper adresses authentication and access control in the frame of the IoT. It presents Physical Unclonable Functions (PUF), which can provide cheap, secure, tamper-proof secret keys to authentify constrained M2M devices. To be successfully used in the IoT context, this technology needs to be embedded in a standardized identity and access management framework. On the other hand, Embedded Subscriber Identity Module (eSIM) can provide cellular connectivity with scalability, interoperability and standard compliant security protocols. The paper discusses an authorization scheme for a constrained resource server taking advantage of PUF and eSIM features. Concrete IoT uses cases are discussed (SCADA and building automation).
Fichier principal
Vignette du fichier
2014_ReCoSoC_Cherkaoui_Bossuet.pdf (156.11 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

ujm-01011300 , version 1 (23-06-2014)

Identifiers

  • HAL Id : ujm-01011300 , version 1

Cite

Abdelkarim Cherkaoui, Lilian Bossuet, L. Seitz, G. Selander, R. Borgaonkar. New Paradigms for Access Control in Constrained Environments. 9th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC), May 2014, Montpellier, France. 4 p. ⟨ujm-01011300⟩
103 View
548 Download

Share

Gmail Facebook Twitter LinkedIn More