Authentication and Authorization for IoT Devices in Disadvantaged Environments.
Sebastián EcheverríaGrace A. LewisDan KlinedinstLudwig SeitzPublished in: WF-IoT (2019)
Keyphrases
- intelligent environments
- security requirements
- access control
- management system
- mobile devices
- fine grained
- cloud computing
- smart objects
- authentication protocol
- everyday objects
- security mechanisms
- physical world
- dynamic environments
- trust negotiation
- conflict resolution
- low cost
- ubiquitous computing environments
- trust management
- biometric authentication
- trust relationships
- mobile computing
- computing environments
- ambient intelligence
- usage control