Skip to main content

Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Abstract

One of the most profound changes today is the increase in mobility of portable yet powerful wireless devices capable of communicating via several different kinds of wireless radio networks of varying link-level characteristics. Requirement for identity is not adequately met in networks, especially given the emergence of ubiquitous computing devices that are mobile and use wireless communications. Addressing identity problem requires changes to the architecture for naming, addressing, and discovery. Challenges include resource discovery; ways to expose relevant privacy distinctions to users, naming and addressing that restricts precise knowledge of identity to authorized parties. This paper presents the identity management (IdM) framework for internet of things (IoT) with the study of existing systems, and addresses the key challenges.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Telecommunication Union 2005. The Internet of Things. ITU Internet Reports (November 2005)

    Google Scholar 

  2. Sarma, A., Girao, J.: Identities in the Future Internet of Things, Wireless Pers Commun. 49, 353–363 (2009); Springer Science+Business Media, LLC. 200, Tuesday, April 07 (2009)

    Google Scholar 

  3. Daniels. A Ubiquitous Computing (December 6, 1997), http://www.cc.getch.edu/class/cs6751_97_fallprojects/gacha/daniels_essay.html (last viewed on July 2008)

  4. OpenID Authentication 2.0, Finalized OpenID Specification (December 2007)

    Google Scholar 

  5. The Liberty Alliance (October 2007), http://www.projectliberty.org/ (accessed 2008-08-15)

  6. Microsoft Corporation, Windows CardSpace (2006), http://cardspace.netfx3.com/ (accessed 2008-08-15)

  7. Shibboleth project, http://shibboleth.internet2.edu/

  8. Higgins, http://www.eclipse.org/higgins/

  9. Miyata, T., Koga, Y., Madsen, P., Adachi, S., Tsuchiya, Y., Sakamoto, Y., Takahashi, K.: A Survey on Identity Management Protocols and Standards. ACM IEICE –Transactions on Information and Systems E89-D(1), 112–123 (2006)

    Article  Google Scholar 

  10. Thompson, C.W., Thompson, D.R.: Identity Management. IEEE Internet Computing, 82–85 (May/June 2007)

    Google Scholar 

  11. Leung, A., Mitchell, C.J.: A Device Management Framework for Secure Ubiquitous Service Delivery. In: The Fourth International Conference on Information Assurance and Security, Naples, Italy (September 2008)

    Google Scholar 

  12. Stango, A., Prasad, N.R., Kyriazanos, D.M.: A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. In: Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, June 18-23, pp. 262–267 (2009)

    Google Scholar 

  13. Kohno, T., Broido, A., claffy, k.: Remote physical device fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 211–225. IEEE Computer Society, Los Alamitos (May 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mahalle, P., Babar, S., Prasad, N.R., Prasad, R. (2010). Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics