8,974 research outputs found

    UniquID: A Quest to Reconcile Identity Access Management and the Internet of Things

    Full text link
    The Internet of Things (IoT) has caused a revolutionary paradigm shift in computer networking. After decades of human-centered routines, where devices were merely tools that enabled human beings to authenticate themselves and perform activities, we are now dealing with a device-centered paradigm: the devices themselves are actors, not just tools for people. Conventional identity access management (IAM) frameworks were not designed to handle the challenges of IoT. Trying to use traditional IAM systems to reconcile heterogeneous devices and complex federations of online services (e.g., IoT sensors and cloud computing solutions) adds a cumbersome architectural layer that can become hard to maintain and act as a single point of failure. In this paper, we propose UniquID, a blockchain-based solution that overcomes the need for centralized IAM architectures while providing scalability and robustness. We also present the experimental results of a proof-of-concept UniquID enrolment network, and we discuss two different use-cases that show the considerable value of a blockchain-based IAM.Comment: 15 pages, 10 figure

    Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements

    Get PDF
    Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    The global information technology report 2014

    Get PDF
    Executive summary When The Global Information Technology Report (GITR) and the Networked Readiness Index (NRI) were created more than 13 years ago, the attention of decision makers was focused on how to develop strategies that would allow them to benefit from what Time Magazine had described as “the new economy”: a new way of organizing and managing economic activity based on the new opportunities that the Internet provided for businesses. At present, the world is slowly emerging from one of the worst financial and economic crises in decades, and policymakers, business leaders, and civil society are looking into new opportunities that can consolidate growth, generate new employment, and create business opportunities. Information and communication technologies (ICTs) continue to rank high on the list as one of the key sources of new opportunities to foster innovation and boost economic and social prosperity, for both advanced and emerging economies. For more than 13 years, the NRI has provided decision makers with a useful conceptual framework to evaluate the impact of ICTs at a global level and to benchmark the ICT readiness and usage of their economies

    The global cultural commons after Cancun: identity, diversity and citizenship

    Get PDF
    The cultural politics of global trade is a new and unexplored terrain because the public domain of culture has long been associated with national sovereignty. States everywhere have invested heavily in national identity. But in an age of globalization, culture and sovereignty have become more complex propositions, subject to global pressures and national constraints. This paper argues three main points. First, new information technologies increasingly destabilize traditional private sector models for disseminating culture. At the same time, international legal rules have become more restrictive with respect to investment and national treatment, two areas at the heart of cultural policy. Second, Doha has significant implications for the future of the cultural commons. Ongoing negotiations around TRIPS, TRIMS, GATS and dispute settlement will impose new restrictions on public authorities who wish to appropriate culture for a variety of public and private ends. Finally, there is a growing backlash against the WTO’s trade agenda for broadening and deepening disciplines in these areas. These issues have become highly politicized and fractious, and are bound to vex future rounds as the global south, led by Brazil, India and China flexes its diplomatic muscle

    Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies

    Get PDF
    The recent boom in the Internet of Things (IoT) will turn Smart Cities and Smart Homes (SH) from hype to reality. SH is the major building block for Smart Cities and have long been a dream for decades, hobbyists in the late 1970s made Home Automation (HA) possible when personal computers started invading home spaces. While SH can share most of the IoT technologies, there are unique characteristics that make SH special. From the result of a recent research survey on SH and IoT technologies, this paper defines the major requirements for building SH. Seven unique requirement recommendations are defined and classified according to the specific quality of the SH building blocks
    • 

    corecore