The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include: Internet of Things; Identity Management; Identity models in Internet of Things; Identity management and trust in the Internet of Things context; Authentication and access control; Identity management for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identity management and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control. Key milestones identified for Identity management are clustering with hierarchical addressing, trust management, mutual authentication and access control. Identity management for Internet of Things is ideal for personnel in computer/communication industries as well as academic staff and master/research students in wireless communication, computer science, operational research, electrical engineering and telecommunication systems Internet, and cloud computing.
Recommendations
Identity management for Internet of Things: Concepts, challenges and opportunities
AbstractThe number of connected devices is growing exponentially, fueling the rise of diverse new Internet of Things (IoT) applications. While the benefits of IoT for society are undeniable, the lack of a proper Identity Management (IdM) system for IoT ...
Identity Management and Integrity Protection in the Internet of Things
EST '12: Proceedings of the 2012 Third International Conference on Emerging Security TechnologiesAuthentication and Identity Management help to protect resources and justify trust in "bona fide" operation by service client and service provider. Besides, identity management can support hardware assisted integrity protection. In the Internet of ...
An Identity Management Framework for Internet of Things
ICEBE '15: Proceedings of the 2015 IEEE 12th International Conference on e-Business EngineeringThe Internet of Things (IoT) has been developing rapidly in the past few years. In IoT, an enormous number of smart devices are connected to the network, where communication and interaction occurs extensively among end users, smart devices and Internet ...