DocumentCode :
182281
Title :
Delegated Authenticated Authorization for Constrained Environments
Author :
Gerdes, Stefanie ; Bergmann, Olaf ; Bormann, Carsten
fYear :
2014
fDate :
21-24 Oct. 2014
Firstpage :
654
Lastpage :
659
Abstract :
Smart objects are small devices with limited system resources, typically made to fulfill a single simple task. By connecting smart objects and thus forming an Internet of Things, the devices can interact with each other and their users and support a new range of applications. Due to the limitations of smart objects, common security mechanisms are not easily applicable. Small message sizes and the lack of processing power severely limit the devices´ ability to perform cryptographic operations. This paper introduces a protocol for delegating client authentication and authorization in a constrained environment. The protocol describes how to establish a secure channel based on symmetric cryptography between resource-constrained nodes in a cross-domain setting. A resource-constrained node can use this protocol to delegate authentication of communication peers and management of authorization information to a trusted host with less severe limitations regarding processing power and memory.
Keywords :
Internet of Things; cryptographic protocols; Internet of Things; client authentication; constrained environments; cross-domain setting; delegated authenticated authorization; protocol; resource-constrained node; smart objects; symmetric cryptography; trusted host; Authentication; Authorization; Face; Peer-to-peer computing; Performance evaluation; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Protocols (ICNP), 2014 IEEE 22nd International Conference on
Conference_Location :
Raleigh, NC
Print_ISBN :
978-1-4799-6203-7
Type :
conf
DOI :
10.1109/ICNP.2014.104
Filename :
6980443
Link To Document :
بازگشت