A. Corici, Yatindra Shashi, M. Corici, Ranjan Shrestha, David Guzman
{"title":"启用动态物联网安全域:蜂窝核心网和设备管理满足认证框架","authors":"A. Corici, Yatindra Shashi, M. Corici, Ranjan Shrestha, David Guzman","doi":"10.1109/GIOTS.2019.8766390","DOIUrl":null,"url":null,"abstract":"The Internet of Things technology is taking advantage of the advancements in hardware and software platforms for enabling new application domains like smart buildings and in a general sense, smart (indoor) environments. Some of the key requirements are security and flexibility. Access control plays an important role in granting access to resources like network and data storage and retrieval to devices joining the security domain. This article introduces a solution for enabling dynamic security domains in which devices join in a trustful way via an authentication framework. In the present paper we document the addressed usecases and requirements, the background technology evolution from 4G to 5G core network, together with the proposed solution and its results using a laboratory testbed.","PeriodicalId":149504,"journal":{"name":"2019 Global IoT Summit (GIoTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Enabling Dynamic IoT Security Domains : Cellular Core Network and Device Management Meet Authentication Framework\",\"authors\":\"A. Corici, Yatindra Shashi, M. Corici, Ranjan Shrestha, David Guzman\",\"doi\":\"10.1109/GIOTS.2019.8766390\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things technology is taking advantage of the advancements in hardware and software platforms for enabling new application domains like smart buildings and in a general sense, smart (indoor) environments. Some of the key requirements are security and flexibility. Access control plays an important role in granting access to resources like network and data storage and retrieval to devices joining the security domain. This article introduces a solution for enabling dynamic security domains in which devices join in a trustful way via an authentication framework. In the present paper we document the addressed usecases and requirements, the background technology evolution from 4G to 5G core network, together with the proposed solution and its results using a laboratory testbed.\",\"PeriodicalId\":149504,\"journal\":{\"name\":\"2019 Global IoT Summit (GIoTS)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Global IoT Summit (GIoTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GIOTS.2019.8766390\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Global IoT Summit (GIoTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GIOTS.2019.8766390","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Internet of Things technology is taking advantage of the advancements in hardware and software platforms for enabling new application domains like smart buildings and in a general sense, smart (indoor) environments. Some of the key requirements are security and flexibility. Access control plays an important role in granting access to resources like network and data storage and retrieval to devices joining the security domain. This article introduces a solution for enabling dynamic security domains in which devices join in a trustful way via an authentication framework. In the present paper we document the addressed usecases and requirements, the background technology evolution from 4G to 5G core network, together with the proposed solution and its results using a laboratory testbed.