The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32807
The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Survey of internet of things ecosystem, protocols, identity relation management, multifactor authentication.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1125575

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1247

References:


[1] Report on the Public Consultation on IOT Governance, European Commission January 2013
[2] Insights on Governance, Risk and Compliance: Cybersecurity and the Internet of Things, Ernst and Young, March 2015
[3] The Internet of Things: prepare for a Connected Life, Lancaster Online, January 2015 http://lancasteronline.com/features/the-internet-of-things-prepare-for-a-connected-life/article_27a9c5ec-980d-11e4-9944-1fefbe6e1564.html retrieved on 3/5/16
[4] The Identity of Things for the Internet, Gartner, February 2015
[5] The Internet of Things Security Study: Smartwatches, HP, 2015
[6] Identity and Access Management for the Internet of Things – Summary Guidance, Cloud Security Alliance IOT Working Group, 2015
[7] Accenture Digital Consumer Survey for Communications, Media, and Technology (CMT), 2015
[8] https://kantarainitiative.org/irmpillars/ retrieved on 3/5/16
[9] Differences between the privacy laws in the EU and the US, Infosec Institute, January 2013
[10] http://blog.atmel.com/2015/05/05/atmel-and-mxchip-develop-wi-fi-platform-with-secure-cloud-access-for-iot-apps/ retrieved on 3/5/16
[11] http://electronicdesign.com/iot/mqtt-and-coap-underlying-protocols-iot retrieved on 3/5/16
[12] http://portals.omg.org/dds/ retrieved on 3/5/16
[13] http://www.zigbee.org/ retrieved on 3/5/16
[14] http://www.rs-online.com/designspark/electronics/knowledge-item/ eleven-internet-of-things-iot-protocols-you-need-to-know-about retrieved on 3/5/16
[15] http://www.infoworld.com/article/2972143/internet-of-things/real-time-protocols-for-iot-apps.html retrieved on 3/5/16