z-logo
open-access-imgOpen Access
Access control in IoT environments: Feasible scenarios
Author(s) -
Yasmina Andaloussi,
Driss El Ouadghiri,
Yoann Maurel,
JeanMarie Bonnin,
Habiba Chaoui
Publication year - 2018
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2018.04.144
Subject(s) - computer science , computer security , anonymity , access control , authentication (law) , internet of things , focus (optics) , internet privacy , information sensitivity , cryptography , personally identifiable information , identity (music) , control (management) , the internet , world wide web , physics , artificial intelligence , acoustics , optics
The Internet of Things (IoT) is the extension of the internet to the physical world where all objects collect information and interact with their environments with no or little human intervention. They collect and transfer sensitive and private data from various users. This puts security and privacy issues at the forefront: the ability to manage the digital identity of millions of people and billions of devices is fundamental for success. As most of the information contained in IoT environment may be personal or sensitive data, there is a requirement to support anonymity and restrain access to information. This article will focus on access control and authentication mechanisms as well as supporting the cryptography algorithms in constrained devices.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom