Danish Showkat, Shubranil Som, S. Khatri, Armaan Singh Ahluwalia
{"title":"使用身份验证和访问控制的物联网中的安全含义","authors":"Danish Showkat, Shubranil Som, S. Khatri, Armaan Singh Ahluwalia","doi":"10.1109/ICRITO.2018.8748731","DOIUrl":null,"url":null,"abstract":"The Internet of Things digitizes physical assets like sensors, devices, machines, gateways, and the network. IOT connects people to things and things to things in real time. Smartphones, Tablets, wearable technologies, and smart home devices are now being adapted in everyday lives. As the nature of IOT is heterogeneous due to its evolving technologies in several areas. People, devices and organizations are connected in IOT environment. This situation presents many imperatives and confinements. Therefore it is critical to guarantee security that incorporates validation in a proper way. Therefore a well-defined framework should be designed to eliminate the threats that IOT possesses in terms of security. In this paper, a structure has been presented for mobile devices that implements confirmation and authorization.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Security Implications in IoT using Authentication and Access Control\",\"authors\":\"Danish Showkat, Shubranil Som, S. Khatri, Armaan Singh Ahluwalia\",\"doi\":\"10.1109/ICRITO.2018.8748731\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things digitizes physical assets like sensors, devices, machines, gateways, and the network. IOT connects people to things and things to things in real time. Smartphones, Tablets, wearable technologies, and smart home devices are now being adapted in everyday lives. As the nature of IOT is heterogeneous due to its evolving technologies in several areas. People, devices and organizations are connected in IOT environment. This situation presents many imperatives and confinements. Therefore it is critical to guarantee security that incorporates validation in a proper way. Therefore a well-defined framework should be designed to eliminate the threats that IOT possesses in terms of security. In this paper, a structure has been presented for mobile devices that implements confirmation and authorization.\",\"PeriodicalId\":439047,\"journal\":{\"name\":\"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"146 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRITO.2018.8748731\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2018.8748731","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Implications in IoT using Authentication and Access Control
The Internet of Things digitizes physical assets like sensors, devices, machines, gateways, and the network. IOT connects people to things and things to things in real time. Smartphones, Tablets, wearable technologies, and smart home devices are now being adapted in everyday lives. As the nature of IOT is heterogeneous due to its evolving technologies in several areas. People, devices and organizations are connected in IOT environment. This situation presents many imperatives and confinements. Therefore it is critical to guarantee security that incorporates validation in a proper way. Therefore a well-defined framework should be designed to eliminate the threats that IOT possesses in terms of security. In this paper, a structure has been presented for mobile devices that implements confirmation and authorization.