Abstract
One of the most profound changes today is the increase in mobility of portable yet powerful wireless devices capable of communicating via several different kinds of wireless radio networks of varying link-level characteristics. Requirement for identity is not adequately met in networks, especially given the emergence of ubiquitous computing devices that are mobile and use wireless communications. Addressing identity problem requires changes to the architecture for naming, addressing, and discovery. Challenges include resource discovery; ways to expose relevant privacy distinctions to users, naming and addressing that restricts precise knowledge of identity to authorized parties. This paper presents the identity management (IdM) framework for internet of things (IoT) with the study of existing systems, and addresses the key challenges.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
International Telecommunication Union 2005. The Internet of Things. ITU Internet Reports (November 2005)
Sarma, A., Girao, J.: Identities in the Future Internet of Things, Wireless Pers Commun. 49, 353–363 (2009); Springer Science+Business Media, LLC. 200, Tuesday, April 07 (2009)
Daniels. A Ubiquitous Computing (December 6, 1997), http://www.cc.getch.edu/class/cs6751_97_fallprojects/gacha/daniels_essay.html (last viewed on July 2008)
OpenID Authentication 2.0, Finalized OpenID Specification (December 2007)
The Liberty Alliance (October 2007), http://www.projectliberty.org/ (accessed 2008-08-15)
Microsoft Corporation, Windows CardSpace (2006), http://cardspace.netfx3.com/ (accessed 2008-08-15)
Shibboleth project, http://shibboleth.internet2.edu/
Higgins, http://www.eclipse.org/higgins/
Miyata, T., Koga, Y., Madsen, P., Adachi, S., Tsuchiya, Y., Sakamoto, Y., Takahashi, K.: A Survey on Identity Management Protocols and Standards. ACM IEICE –Transactions on Information and Systems E89-D(1), 112–123 (2006)
Thompson, C.W., Thompson, D.R.: Identity Management. IEEE Internet Computing, 82–85 (May/June 2007)
Leung, A., Mitchell, C.J.: A Device Management Framework for Secure Ubiquitous Service Delivery. In: The Fourth International Conference on Information Assurance and Security, Naples, Italy (September 2008)
Stango, A., Prasad, N.R., Kyriazanos, D.M.: A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. In: Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, June 18-23, pp. 262–267 (2009)
Kohno, T., Broido, A., claffy, k.: Remote physical device fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 211–225. IEEE Computer Society, Los Alamitos (May 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mahalle, P., Babar, S., Prasad, N.R., Prasad, R. (2010). Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)