module is presented. Adding OAuth 2.0 security fea-
ture was one of the major steps taken to improve the
existing security module. However, the requirements,
the core design decisions, and the code structure are
conceived to be generally applicable to other systems,
providing a solid foundation for a further abstraction
and generality of the used approach.
Future work will be to implement JSON Web To-
ken (JWT) in the O-MI reference implementation to
achieve good performance and portability. With JWT,
there is no session to manage as the security informa-
tion is digitally signed and self-contained in the token,
which makes the system stateless. Further, the work
will be extended to reduce network round trip time by
sharing user ID between OAuth 2.0 and Access Con-
trol module, instead of retrieving the ID from autho-
rization module.
REFERENCES
Authorization Code Grant - OAuth2.0 Servers. https:
//www.oauth.com/oauth2-servers/server-side-apps/
authorization-code/. [Online]; accessed October
2019.
Benefits of OAuth 2.0. https://subscription.packtpub.
com/book/application development/9781783285594/
1/ch01lvl1sec09/benefits-of-oauth-2-0. [Online];
accessed October 2019.
OAuth Use Cases. https://tools.ietf.org/html/
draft-ietf-oauth-use-cases-01. [Online]; accessed
December 2019.
The OAuth 2.0 Authorization Framework. https://tools.ietf.
org/html/rfc6749. [Online]; accessed October 2019.
User Authentication with OAuth 2.0. https://oauth.net/
articles/authentication/. [Online]; accessed October
2019.
Buyya, R. and Dastjerdi, A. V. (2016). Internet of Things:
Principles and paradigms. Elsevier.
Chae, C.-J., Choi, K.-N., Choi, K., Yae, Y.-H., and Shin,
Y. (2015). The Extended Authentication Protocol us-
ing E-mail Authentication in OAuth 2.0 Protocol for
Secure Granting of User Access. Journal of Internet
Computing and Services (JICS), 16(1):21–28.
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., and Ferrari,
G. (2014). IoT-OAS: An OAuth-based Authorization
Service Architecture for Secure Services in IoT Sce-
narios. IEEE sensors journal, 15(2):1224–1234.
Emerson, S., Choi, Y., Hwang, D., Kim, K., and Kim, K.
(2015). An OAuth based authentication mechanism
for IoT networks. In International Conference on
Information and Communication Technology Conver-
gence, ICTC 2015, Jeju Island, South Korea, October
28-30, 2015, pages 1072–1074.
Fremantle, P. and Aziz, B. (2016). OAuthing: Privacy-
enhancing federation for the Internet of Things. In
2016 Cloudification of the Internet of Things, CIoT
2016, Paris, France, November 23-25, 2016, pages 1–
6.
Fremantle, P., Aziz, B., Kopeck
´
y, J., and Scott, P. (2014).
Federated Identity and Access Management for the
Internet of Things. In 2014 International Workshop
on Secure Internet of Things, SIoT 2014, Wroclaw,
Poland, September 10, 2014, pages 10–17.
Javed, A., Yousefnezhad, N., Robert, J., Heljanko, K.,
and Fr
¨
amling, K. (2019). Access Time Improve-
ment Framework for Standardized IoT Gateways. In
IEEE International Conference on Pervasive Comput-
ing and Communications Workshops, PerCom Work-
shops 2019, Kyoto, Japan, March 11-15, 2019, pages
220–226.
Khan, J., ping Li, J., Ali, I., Parveen, S., ahmad Khan,
G., Khalil, M., Khan, A., Haq, A. U., and Shahid,
M. (2018). An Authentication Technique Based on
Oauth 2.0 Protocol for Internet of Things (IoT) Net-
work. In 2018 15th International Computer Con-
ference on Wavelet Active Media Technology and In-
formation Processing (ICCWAMTIP), pages 160–165.
IEEE.
Kubler, S., Madhikermi, M., Buda, A., and Fr
¨
amling, K.
(2014). QLM Messaging Standards: Introduction and
Comparison with Existing Messaging Protocols. In
Service Orientation in Holonic and Multi-Agent Man-
ufacturing and Robotics, pages 237–256.
Lightfoot, J. (2018). Authentication and authorization:
Openid vs oauth2 vs saml. https://spin.atomicobject.
com/2016/05/30/openid-oauth-saml/. [Online]; ac-
cessed October 2019.
Lodderstedt, T., Mcgloin, M., and Hunt, P. (2013). OAuth
2.0 Threat Model and Security Considerations. RFC,
6819:1–71.
Madhikermi, M., Yousefnezhad, N., and Fr
¨
amling, K.
(2018). Data Exchange Standard for Industrial Inter-
net of Things. In 2018 3rd International Conference
on System Reliability and Safety (ICSRS), pages 53–
61. IEEE.
Mangal, A. (2019). OAuth 2.0 - The Good, The Bad
& The Ugly. https://code.tutsplus.com/articles/
oauth-20-the-good-the-bad-the-ugly--net-33216.
[Online]; accessed October 2019.
Saeed, A. (2018). Authentication and Authorization Mod-
ules for Open Messaging Interface (O-MI). Master’s
Thesis, Aalto University.
Sciancalepore, S., Piro, G., Caldarola, D., Boggia, G., and
Bianchi, G. (2017). OAuth-IoT: An access control
framework for the Internet of Things based on open
standards. In 2017 IEEE Symposium on Computers
and Communications, ISCC 2017, Heraklion, Greece,
July 3-6, 2017, pages 676–681.
Yao, X., Han, X., Du, X., and Zhou, X. (2013). A
lightweight multicast authentication mechanism for
small scale IoT applications. IEEE Sensors Journal,
13(10):3693–3701.
Yousefnezhad, N., Filippov, R., Javed, A., Buda, A., Mad-
hikermi, M., and Fr
¨
amling, K. (2017). Authenti-
cation and Access Control for Open Messaging In-
terface Standard. In Proceedings of the 14th EAI
International Conference on Mobile and Ubiquitous
Systems: Computing, Networking and Services, Mel-
bourne, Australia, November 7-10, 2017., pages 20–
27.
An OAuth-based Authentication Mechanism for Open Messaging Interface Standard
225