Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things
University of California, Berkeley.
University of California, Berkeley.
University of California, Berkeley.
KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS. (Model-based Computing Systems (MCS))ORCID iD: 0000-0001-8457-4105
2017 (English)In: Internet-of-Things Design and Implementation (IoTDI), 2017 IEEE/ACM Second International Conference on, ACM Digital Library, 2017, 147-158 p.Conference paper, Published paper (Refereed)
Abstract [en]

The challenges posed by the Internet of Things (IoT) render existing security measures ineffective against emerging networks and devices. These challenges include heterogeneity, operation in open environments, and scalability. In this paper, we propose SST (Secure Swarm Toolkit), an open-source toolkit for construction and deployment of an authorization service infrastructure for the IoT. The infrastructure uses distributed local authorization entities, which provide authorization services that can address heterogeneous security requirements and resource constraints in the IoT. The authorization services can be accessed by network entities through software interfaces provided by SST, called accessors. The accessors enable IoT developers to readily integrate their devices with authorization services without needing to manage cryptographic keys and operations. To rigorously show that SST provides necessary security guarantees, we have performed a formal security analysis using an automated verification tool. In addition, we demonstrate the scalability of our approach with a mathematical analysis, as well as experiments to evaluate security overhead of network entities under different security profiles supported by SST

Place, publisher, year, edition, pages
ACM Digital Library, 2017. 147-158 p.
National Category
Computer Science
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-206583DOI: dl.acm.org/citation.cfm?doid=3054977.3054980OAI: oai:DiVA.org:kth-206583DiVA: diva2:1093403
Conference
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation,Pittsburgh, PA, USA, 18-21 April 2017
Note

QC 20170704

Available from: 2017-05-05 Created: 2017-05-05 Last updated: 2017-07-04Bibliographically approved

Open Access in DiVA

fulltext(2925 kB)4 downloads
File information
File name FULLTEXT01.pdfFile size 2925 kBChecksum SHA-512
a42a63f772cd2b8cd33aa683c0aa41e740de276ed0463e7fe953d3d3905fd0123bf3c7248bca975dc67eabe636272e5d85e456663e1b7d8edba0a20fcd9e08a3
Type fulltextMimetype application/pdf

Other links

Publisher's full textIEEEXplore

Search in DiVA

By author/editor
Broman, David
By organisation
Software and Computer systems, SCS
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 4 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 22 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf