Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices
Elías Grande, Marta Beltrán
2020
Abstract
The Internet of Things (IoT) is not a traditional network, and this is the reason why it presents new and unique challenges such as identification, addressing, naming, authentication or authorization of constrained devices. Edge approaches rely on distributed platforms at the network edge serving as a bridge between the physical world (things and data sources, often very constrained devices) and the IoT-cloud services (digital services offered from full-resource servers in the cloud, often not real-time and bandwidth-consuming). The main contributions of this work are the specification of a new event-driven addressing approach for IoT relying on edge-centric delegation of authorization which appropriately adapts and extends the well-known OAuth 2.0 specification for the IoT and a novel approach for naming constrained devices in large scale scenarios that does not depend on the application domain or on the deployment and implementation details. Furthermore, the definition of the Enrolment and Action flows solving the most important challenges arising in the considered scenario: enrolment at the edge device, name-oriented networking, authentication, and authorization using access control tokens as a mechanism for transferring access rights from one agent (edge device) to another (constrained device).
DownloadPaper Citation
in Harvard Style
Grande E. and Beltrán M. (2020). Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices.In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - Volume 3: SECRYPT, ISBN 978-989-758-446-6, pages 559-564. DOI: 10.5220/0009804705590564
in Bibtex Style
@conference{secrypt20,
author={Elías Grande and Marta Beltrán},
title={Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices},
booktitle={Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - Volume 3: SECRYPT,},
year={2020},
pages={559-564},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0009804705590564},
isbn={978-989-758-446-6},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - Volume 3: SECRYPT,
TI - Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge Devices
SN - 978-989-758-446-6
AU - Grande E.
AU - Beltrán M.
PY - 2020
SP - 559
EP - 564
DO - 10.5220/0009804705590564