Trust extension protocol for authentication in networks oriented to management (TEPANOM)

Jara, Antonio (University of Applied Sciences and Arts Western Switzerland (HES-SO Valais-Wallis))

Future Internet of Things is being deployed massively, since it is being already concerned deployments with thousands of nodes, which present a new dimension of capacities for monitoring solutions such as smart cities, home automation, and continuous healthcare. This new dimension is also presenting new challenges, in issues related with scalability, security and management, which require to be addressed in order to make feasible the Internet of Things-based solutions. This work presents a Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM). This protocol allows, on the one hand, the identity verification and authentication in the system, and on the other hand the bootstrapping, configuration and trust extension of the deployment and management domains to the new device. Thereby, TEPANOM defines a scalable network management solution for the Internet of Things, which addresses the security requirements, and allows an easy, and transparent support for the management, which are highly desirable and necessary features for the successful of the solutions based on the Internet of things. The proposed protocol has been instanced for the use case of a fire alarm management system, and successfully evaluated with the tools from the Automated Validation of Internet Security Protocols and Applications (AVISPA) framework.

Type de conférence:
full paper
Economie et Services
HEG VS HES-SO Valais-Wallis - Haute Ecole de Gestion & Tourisme
Institut Informatique de gestion
Adresse bibliogr.:
Fribourg, Switzerland, 08-12 September 2014
Fribourg, Switzerland
08-12 September 2014
11 p.
Titre du document hôte:
Availability, Reliability, and Security in Information Systems : Proceedings of IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference (CD-ARES) and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD) 2014
Le document apparaît dans:

Note  Le statut de ce document est: non diffusé

Note: The status of this file is: restricted

 Notice créée le 2015-11-15, modifiée le 2018-02-15

Télécharger le document

Évaluer ce document:

Rate this document:
(Pas encore évalué)