The Role Of Access Control And Device Authentication In The Internet Of Things

The new generation of wireless sensor networks that is known as the internet of things enables the direct connection of physical objects to the internet using microcontrollers. In most cases, these microcontrollers have very limited computational resources. In this study, we investigate the access c...

Full description

Saved in:
Bibliographic Details
Main Authors: Thiab, Ali Shawket, Shibghatullah, Abdul Samad, Mohd Yusoh, Zeratul Izzah
Format: Article
Language:en
Published: Medwell Journals 2018
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/21651/2/2018%20Ali%20JEAS%20Published%20TheRoleofAccessControl.pdf
http://eprints.utem.edu.my/id/eprint/21651/
http://docsdrive.com/pdfs/medwelljournals/jeasci/2018/2680-2684.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The new generation of wireless sensor networks that is known as the internet of things enables the direct connection of physical objects to the internet using microcontrollers. In most cases, these microcontrollers have very limited computational resources. In this study, we investigate the access control solution for the IETF standard draft constrained application protocol using the datagram transport layer security protocol for transport security. We use the centralized approach to save access control information in the framework. Since, the public key cryptography operations might be computationally too expensive for constrained devices we build our solution based on symmetric cryptography.