4 research outputs found

    A survey on authentication techniques for the internet of things

    Get PDF
    The Internet of things (IoT) is the technology, which forms the foundation of today;s smart and connected world. The IoT is a network used to interconnect embedded devices, such as sensors, which are able to generate, communicate and share data with one another. In such an enormous network of interconnected smart objects, the identification of a specific object poses a fundamental task that influences all other functions of the system, such as its governance, privacy features, access control, overall architecture, etc. This paper presents a critical review of the prominent and recent authentication techniques for IoT objects. This is followed by a discussion of the limitations of current authentication techniques and future research avenues and opportunities

    Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds

    Get PDF
    In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PAbAC, that combines attribute based encryption and attribute based signature techniques for securely sharing outsourced data contents via public cloud servers. The proposed framework presents several advantages. First, it provides an encrypted access control feature, enforced at the data owner’s side, while providing the desired expressiveness of access control policies. Second, Ins-PAbAC preserves users’ privacy, relying on an anonymous authentication mechanism, derived from a privacy preserving attribute based signature scheme that hides the users’ identifying information. Furthermore, our proposal introduces an accountable attribute based signature that enables an inspection authority to reveal the identity of the anonymously-authenticated user if needed. Third, Ins-PAbAC is provably secure, as it is resistant to both curious cloud providers and malicious users adversaries. Finally, experimental results, built upon OpenStack Swift testbed, point out the applicability of the proposed scheme in real world scenarios

    Security in product lifecycle of IoT devices: A survey

    No full text
    corecore