Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
An Architectural Mechanism for Resilient IoT Services
KTH, School of Information and Communication Technology (ICT), Software and Computer systems, SCS.ORCID iD: 0000-0001-8457-4105
2017 (English)In: SafeThings 2017 - Proceedings of the 1st ACM International Workshop on the Internet of Safe Things, Part of SenSys 2017, Association for Computing Machinery (ACM), 2017, p. 8-13Conference paper, Published paper (Refereed)
Abstract [en]

Availability of authentication and authorization services is critical for the safety of the Internet of Things (IoT). By leveraging an emerging network architecture based on edge computers, IoT’s availability can be protected even under situations such as network failures or denial-of-service (DoS) attacks. However, little has been explored for the issue of sustaining availability even when edge computers fail. In this paper, we propose an architectural mechanism for enhancing the availability of the authorization infrastructure for the IoT. The proposed approach leverages a technique called secure migration, which allows IoT devices to migrate to other local authorization entities served in trusted edge computers when their authorization entity becomes unavailable. Specifically, we point out necessary considerations for planning secure migration and present automated migration policy construction and protocols for preparing and executing the migration. The effectiveness of our approach is illustrated using a concrete application of smart buildings and network simulation, where our proposed solution achieves significantly higher availability in case of failures in some of the authorization entities.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2017. p. 8-13
Keywords [en]
Authentication, Authorization, Availability, Denial-of-service attacks, Internet of Things, Network security
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-224294DOI: 10.1145/3137003.3137010Scopus ID: 2-s2.0-85041416599ISBN: 9781450354790 OAI: oai:DiVA.org:kth-224294DiVA, id: diva2:1190949
Conference
1st ACM International Workshop on the Internet of Safe Things, SafeThings 2017, Delft, Netherlands, 5 November 2017 through
Funder
Swedish Foundation for Strategic Research , project FFL15-0032
Note

QC 20180316

Available from: 2018-03-16 Created: 2018-03-16 Last updated: 2018-03-16Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Broman, David

Search in DiVA

By author/editor
Broman, David
By organisation
Software and Computer systems, SCS
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 367 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf