2014 International Workshop on Secure Internet of Things最新文献

筛选
英文 中文
Access Control for Apps Running on Constrained Devices in the Internet of Things 在物联网受限设备上运行的应用程序的访问控制
2014 International Workshop on Secure Internet of Things Pub Date : 2014-09-10 DOI: 10.1109/SIoT.2014.11
Andrei Mituca, Amir H. Moin, C. Prehofer
{"title":"Access Control for Apps Running on Constrained Devices in the Internet of Things","authors":"Andrei Mituca, Amir H. Moin, C. Prehofer","doi":"10.1109/SIoT.2014.11","DOIUrl":"https://doi.org/10.1109/SIoT.2014.11","url":null,"abstract":"The increasing interest in applications for the Internet of Things (IoT) has led to the widespread use of efficient but limited operating systems like Contiki OS. Applications running on constrained devices in the IoT should only be able to access those resources which are specified by the user. While on mobile platforms such as the Google Android and the Apple iOS various access control mechanisms are in use, on IoT platforms such as Contiki OS this is not yet provided. In this paper, we explain a number of existing approaches in the mobile ecosystem and mention the research challenges for applying those approaches to one of the well-known operating systems in the IoT ecosystem, i.e., Contiki OS. The main problem is that operating systems for constrained devices in the IoT are quite limited and do not provide any memory protection or virtualization support. As the main contribution, we propose our novel approach for providing fine-grained access controls in Contiki OS under these constraints.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127128277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Threat-Based Security Analysis for the Internet of Things 基于威胁的物联网安全分析
2014 International Workshop on Secure Internet of Things Pub Date : 2014-09-10 DOI: 10.1109/SIOT.2014.10
Ahmad Atamli-Reineh, Andrew P. Martin
{"title":"Threat-Based Security Analysis for the Internet of Things","authors":"Ahmad Atamli-Reineh, Andrew P. Martin","doi":"10.1109/SIOT.2014.10","DOIUrl":"https://doi.org/10.1109/SIOT.2014.10","url":null,"abstract":"The Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. This technology is anticipated to become an integral milestone in the development of smart homes and smart cities. For any technology to be successful and achieve widespread use, it needs to gain the trust of users by providing adequate security and privacy assurance. Despite the growing interest of the research community in IoT, and the emergence of several surveys and papers addressing its architecture and its elements, we are still lacking a thorough analysis of the security and privacy properties that are required for a system where the constituent devices vary in their capabilities. In this paper we provide a threat model based on use-cases of IoT, which can be used to determine where efforts should be invested in order to secure these systems. We conclude by recommending measures that will help in providing security and assuring privacy when using IoT.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 156
A Novel Key Generating Architecture for Wireless Low-Resource Devices 一种新的无线低资源设备密钥生成体系结构
2014 International Workshop on Secure Internet of Things Pub Date : 2014-09-10 DOI: 10.1109/siot.2014.7
Christian T. Zenger, Markus-Julian Chur, Jan-Felix Posielek, C. Paar, G. Wunder
{"title":"A Novel Key Generating Architecture for Wireless Low-Resource Devices","authors":"Christian T. Zenger, Markus-Julian Chur, Jan-Felix Posielek, C. Paar, G. Wunder","doi":"10.1109/siot.2014.7","DOIUrl":"https://doi.org/10.1109/siot.2014.7","url":null,"abstract":"Secret key establishment based on parameters of the communication channel is a highly attractive option for many applications that operate in a dynamic mobile environment with peer-to-peer association. On the other hand, high usability and dynamic key management are still very difficult to achieve for wireless devices which have to operate under strict resource constraints. In fact, most previously reported key generation methods cannot operate in such environment.In this work, we present a new system architecture which is suitable also for resource-constrained platforms. Our design strongly focuses on security, rather than a robust key generation rate, as well as on low complexity and efficiency. Our approach has the potential to dramatically reduce the cost of securing small embedded devices for the Internet of Things, and hence make mass production and deployment viable.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
UNCHAIN - Ubiquitous Wireless Network Communication Architecture for Ambient Intelligence and Health Scenarios UNCHAIN——用于环境智能和健康场景的无所不在的无线网络通信架构
2014 International Workshop on Secure Internet of Things Pub Date : 2014-09-10 DOI: 10.1109/SIoT.2014.12
D. Rosner, R. Tataroiu, L. Gheorghe, Razvan Tilimpea
{"title":"UNCHAIN - Ubiquitous Wireless Network Communication Architecture for Ambient Intelligence and Health Scenarios","authors":"D. Rosner, R. Tataroiu, L. Gheorghe, Razvan Tilimpea","doi":"10.1109/SIoT.2014.12","DOIUrl":"https://doi.org/10.1109/SIoT.2014.12","url":null,"abstract":"Ambient intelligence techniques and smart Internet of Things objects are empowering healthcare professionals to provide better services based on improved vital signs data enriched with contextual information. In this paper, we provide an overview of current solutions and propose a new taxonomy for ambient and health sensor data, based on three selected metrics. The proposed UNCHAIN architecture provides a ubiquitous communication system designed to grant seamless integration of current sensor solutions, and to maximize two identified limitations: range and autonomy. Finally, the proposed architecture is validated through a hardware implementation, with impressive results in terms of energy efficiency.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lightweight Display Virtualization For Mobile Devices 用于移动设备的轻量级显示虚拟化
2014 International Workshop on Secure Internet of Things Pub Date : 2014-09-10 DOI: 10.1109/SIoT.2014.9
M. Cărăbaş, Lucian Mogosanu, Răzvan Deaconescu, L. Gheorghe, N. Tapus
{"title":"Lightweight Display Virtualization For Mobile Devices","authors":"M. Cărăbaş, Lucian Mogosanu, Răzvan Deaconescu, L. Gheorghe, N. Tapus","doi":"10.1109/SIoT.2014.9","DOIUrl":"https://doi.org/10.1109/SIoT.2014.9","url":null,"abstract":"Recent years have witnessed a constant evolution of mobile systems, from hardware improvements such as multi-core CPUs and virtualization extensions, to a rise in software complexity, including application stores that are the home for millions of mobile applications. This enables and encourages the rising trend of mobile virtualization. In this paper we present an approach for providing lightweight and fast display virtualization for mobile devices, allowing multiple operating systems to share the same physical display screen. We describe a design that provides the means to perform efficient display virtualization, making use of the concept of overlays implemented in recent underlying mobile display subsystems. We demonstrate our approach on a dual Android setup: two operating systems running simultaneously on the same mobile device, using our display virtualization framework.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125171243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Federated Identity and Access Management for the Internet of Things 物联网的联邦身份和访问管理
2014 International Workshop on Secure Internet of Things Pub Date : 2014-09-10 DOI: 10.1109/SIoT.2014.8
Paul Fremantle, B. Aziz, J. Kopecký, P. Scott
{"title":"Federated Identity and Access Management for the Internet of Things","authors":"Paul Fremantle, B. Aziz, J. Kopecký, P. Scott","doi":"10.1109/SIoT.2014.8","DOIUrl":"https://doi.org/10.1109/SIoT.2014.8","url":null,"abstract":"We examine the use of Federated Identity and Access Management (FIAM) approaches for the Internet of Things (IoT). We look at specific challenges that devices, sensors and actuators have, and look for approaches to address them. OAuth is a widely deployed protocol -- built on top of HTTP -- for applying FIAM to Web systems. We explore the use of OAuth for IoT systems that instead use the lightweight MQTT 3.1 protocol. In order to evaluate this area, we built a prototype that uses OAuth 2.0 to enable access control to information distributed via MQTT. We evaluate the results of this prototyping activity, and assess the strengths and weaknesses of this approach, and the benefits of using the FIAM approaches with IoT and Machine to Machine (M2M) scenarios. Finally we outline areas for further research.","PeriodicalId":301460,"journal":{"name":"2014 International Workshop on Secure Internet of Things","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116547926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信