Visible to the public A decentralized approach for security and privacy challenges in the Internet of Things

TitleA decentralized approach for security and privacy challenges in the Internet of Things
Publication TypeConference Paper
Year of Publication2014
AuthorsSkarmeta, A.F., Hernández-Ramos, J.L., Moreno, M.V.
Conference NameInternet of Things (WF-IoT), 2014 IEEE World Forum on
Date PublishedMarch
ISBN Number978-1-4799-3459-1
Keywords6LoWPAN, authentication, authorisation, Authorization, CoAP resources, computer network security, cryptographic primitives, cryptography, data privacy, digital signatures, distributed access control, distributed capability-based access control mechanism, ECDSA, elliptic curve digital signature algorithm, information leakage, Internet, Internet of Things, IoT deployment, IoT stakeholders, lightweight token, personal area networks, privacy, public key cryptography, security, security challenges, sensitive data management, user privacy, wireless technologies
Abstract

The strong development of the Internet of Things (IoT) is dramatically changing traditional perceptions of the current Internet towards an integrated vision of smart objects interacting with each other. While in recent years many technological challenges have already been solved through the extension and adaptation of wireless technologies, security and privacy still remain as the main barriers for the IoT deployment on a broad scale. In this emerging paradigm, typical scenarios manage particularly sensitive data, and any leakage of information could severely damage the privacy of users. This paper provides a concise description of some of the major challenges related to these areas that still need to be overcome in the coming years for a full acceptance of all IoT stakeholders involved. In addition, we propose a distributed capability-based access control mechanism which is built on public key cryptography in order to cope with some of these challenges. Specifically, our solution is based on the design of a lightweight token used for access to CoAP Resources, and an optimized implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) inside the smart object. The results obtained from our experiments demonstrate the feasibility of the proposal and show promising in order to cover more complex scenarios in the future, as well as its application in specific IoT use cases.

URLhttp://ieeexplore.ieee.org/document/6803122/
DOI10.1109/WF-IoT.2014.6803122
Citation Key6803122