TY - GEN
T1 - An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems
AU - Fu, Chenglong
AU - Kezmane, Tassadit
AU - Du, Xiaojiang
AU - Fu, Yat
AU - Morrisseau, Colin
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/6/19
Y1 - 2018/6/19
N2 - Internet of Things (IoT) is characterized by integrating heterogeneous devices and technologies with the Internet. It enables the computer network system to connect all kinds of physical objects and interact with the environment directly. However, this integration exposes IoT devices and systems to all kinds of cyber attacks which makes the security risk become the fundamental problem to address. Traditional standardized security solutions face scalability and flexibility issues on providing dynamic protections for the communications between the devices that belong to different security domains. In this paper, we propose reliable authentication scheme for resource constrained IoT devices in the context of distributed, cross-domain systems that are not directly operated by humans. The scheme utilizes an out-of-band channel to achieve effective and light-weight authentication. Finally, we build a prototype system to test the performance of proposed security scheme.
AB - Internet of Things (IoT) is characterized by integrating heterogeneous devices and technologies with the Internet. It enables the computer network system to connect all kinds of physical objects and interact with the environment directly. However, this integration exposes IoT devices and systems to all kinds of cyber attacks which makes the security risk become the fundamental problem to address. Traditional standardized security solutions face scalability and flexibility issues on providing dynamic protections for the communications between the devices that belong to different security domains. In this paper, we propose reliable authentication scheme for resource constrained IoT devices in the context of distributed, cross-domain systems that are not directly operated by humans. The scheme utilizes an out-of-band channel to achieve effective and light-weight authentication. Finally, we build a prototype system to test the performance of proposed security scheme.
UR - http://www.scopus.com/inward/record.url?scp=85050158074&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85050158074&partnerID=8YFLogxK
U2 - 10.1109/ICCNC.2018.8390312
DO - 10.1109/ICCNC.2018.8390312
M3 - Conference contribution
AN - SCOPUS:85050158074
T3 - 2018 International Conference on Computing, Networking and Communications, ICNC 2018
SP - 452
EP - 456
BT - 2018 International Conference on Computing, Networking and Communications, ICNC 2018
T2 - 2018 International Conference on Computing, Networking and Communications, ICNC 2018
Y2 - 5 March 2018 through 8 March 2018
ER -