5 CONCLUSION
This paper has proposed an event-driven addressing
and novel XRI-based naming approach for the Inter-
net of Things, relying on a delegation of authorization
mechanism based on OAuth 2.0 that enables the au-
thenticated and authorized interaction of constrained
devices and IoT-cloud services through edge interme-
diaries. The proposed solution has demonstrated in
different projects that it is scalable (allowing auto-
mated enrolment in large scenarios) and interopera-
ble (based on an event-driven polling approach and on
the same concepts that standard OAuth 2.0 implemen-
tations, only extending them). Enough to solve ad-
dressing issues in almost all scenarios with adequate
efficiency, fault tolerance and security. Furthermore,
abstracting IoT-cloud services from low-level imple-
mentation details.
ACKNOWLEDGMENT
This research has been partially supported by the
Madrid region (EdgeData, Grant Ref. P2018/TCS-
4499) and by the Ericsson-URJC Chair (”Data Sci-
ence applied to 5G”).
REFERENCES
Arnaboldi, L. and Tschofenig, H. (2019). A formal model
for delegated authorization of IoT devices using ACE-
OAuth. In 4th OAuth Security Workshop 2019 (OSW
2019).
Arshad, S., Shahzaad, B., Azam, M. A., Loo, J., Ahmed,
S. H., and Aslam, S. (2018). Hierarchical and flat-
based hybrid naming scheme in content-centric net-
works of things. IEEE Internet of Things Journal,
5(2):1070–1080.
Cheng, B., Zhu, D., Zhao, S., and Chen, J. (2016).
Situation-aware iot service coordination using the
event-driven soa paradigm. IEEE Transactions on
Network and Service Management, 13(2):349–361.
Cirani, S. and Picone, M. (2015). Effective authorization for
the Web of Things. In 2015 IEEE 2nd World Forum
on Internet of Things (WF-IoT), pages 316–320.
G. Wachob, D. Reed, M. L. D. M. D. M.
(2003). XRI requirements and glossary.
http://xml.coverpages.org/XRI-REQv110.pdf.
Hail, M. A. (2019). IoT-NDN: An IoT architecture via
named data netwoking (ndn). In 2019 IEEE Inter-
national Conference on Industry 4.0, Artificial In-
telligence, and Communications Technology (IAICT),
pages 74–80.
IETF (2019). OAuth 2.0 device authorization grant.
https://tools.ietf.org/html/draft-ietf-oauth-device-
flow-15.
Lagutin, D., Kortesniemi, Y., Fotiou, N., and Siris, V. A.
(2019). Enabling decentralised identifiers and verifi-
able credentials for constrained Internet-of-Things de-
vices using OAuth-based delegation. In Proceedings
of the Workshop on Decentralized IoT Systems and Se-
curity (DISS). Internet Society.
Lan, L., Li, F., Wang, B., Zhang, L., and Shi, R. (2014).
An event-driven service-oriented architecture for the
internet of things. In 2014 Asia-Pacific Services Com-
puting Conference, pages 68–73.
Lee, S., Jeong, J., and Park, J. (2015). DNS name auto-
configuration for IoT home devices. In 2015 IEEE
29th International Conference on Advanced Informa-
tion Networking and Applications Workshops, pages
131–134.
Mahmoud, A., Mahyoub, M., Sheltami, T., and Abu-
Amara, M. (2019). Traffic-aware auto-configuration
protocol for service oriented low-power and lossy net-
works in IoT. Wireless Networks, pages 4231–4246.
Moeini, H., Yen, I., and Bastani, F. (2019). Service specifi-
cation and discovery in iot networks. In 2019 IEEE
International Conference on Web Services (ICWS),
pages 55–59.
Pahl, M., Liebald, S., and L
¨
ubben, C. (2019). VSL: A
data-centric internet of things overlay. In 2019 Inter-
national Conference on Networked Systems (NetSys),
pages 1–3.
Sciancalepore, S., Piro, G., Caldarola, D., Boggia, G., and
Bianchi, G. (2018). On the design of a decentralized
and multiauthority access control scheme in federated
and cloud-assisted cyber-physical systems. IEEE In-
ternet of Things Journal, 5(6):5190–5204.
Tanganelli, G., Vallati, C., and Mingozzi, E. (2018). Edge-
centric distributed discovery and access in the internet
of things. IEEE Internet of Things Journal, 5(1):425–
438.
van Thuan, D., Butkus, P., and van Thanh, D. (2014). A user
centric identity management for internet of things.
In 2014 International Conference on IT Convergence
and Security (ICITCS), pages 1–4.
Yan, Z., Kong, N., Tian, Y., and Park, Y. (2013). A univer-
sal object name resolution scheme for IoT. In 2013
IEEE International Conference on Green Computing
and Communications and IEEE Internet of Things and
IEEE Cyber, Physical and Social Computing, pages
1120–1124.
Yang, K., Li, Q., and Sun, L. (2019). Towards automatic
fingerprinting of IoT devices in the cyberspace. Com-
puter Networks, 148:318–327.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
564