Visible to the public Delegated Authenticated Authorization for Constrained Environments

TitleDelegated Authenticated Authorization for Constrained Environments
Publication TypeConference Paper
Year of Publication2014
AuthorsGerdes, S., Bergmann, O., Bormann, C.
Conference NameNetwork Protocols (ICNP), 2014 IEEE 22nd International Conference on
Date PublishedOct
Keywordsauthentication, Authorization, client authentication, constrained environments, cross-domain setting, cryptographic protocols, delegated authenticated authorization, Face, Internet of Things, Peer-to-peer computing, performance evaluation, protocol, Protocols, resource-constrained node, smart objects, symmetric cryptography, trusted host
Abstract

Smart objects are small devices with limited system resources, typically made to fulfill a single simple task. By connecting smart objects and thus forming an Internet of Things, the devices can interact with each other and their users and support a new range of applications. Due to the limitations of smart objects, common security mechanisms are not easily applicable. Small message sizes and the lack of processing power severely limit the devices' ability to perform cryptographic operations. This paper introduces a protocol for delegating client authentication and authorization in a constrained environment. The protocol describes how to establish a secure channel based on symmetric cryptography between resource-constrained nodes in a cross-domain setting. A resource-constrained node can use this protocol to delegate authentication of communication peers and management of authorization information to a trusted host with less severe limitations regarding processing power and memory.

DOI10.1109/ICNP.2014.104
Citation Key6980443