Analysis of authentication mechanisms and identity management in IoT: the resource constraints and security needs | IEEE Conference Publication | IEEE Xplore

Analysis of authentication mechanisms and identity management in IoT: the resource constraints and security needs


Abstract:

The Internet of Things, by the dimension and the important roles that objects will play in their environment, make object authentication and identity management a high is...Show More

Abstract:

The Internet of Things, by the dimension and the important roles that objects will play in their environment, make object authentication and identity management a high issue and a difficult challenge. Sometimes, the complex relationship between objects and users makes identities management difficult to the scalability issues. The heterogeneity of techniques for identifying users and objects is another technological barrier that requires special investigation. The objective of our work is to analyze some mechanisms of authentication and identity management of objects. To carry out this work, we analyzed the fields of application and the socio-economic challenges of IoT. Then, we studied the security needs of IoT. Our work ends with a study and an analysis mechanisms of identity management of objects based on a secure identity integrated into microcontrollers (MCUs), on the provisioning of PKI identities, on a secure identity integrated into electronic chips and by a study and analysis of authentication management mechanisms based on cryptographic solutions by public / private keys, on elliptical curves and on Blockchain.
Date of Conference: 27-28 December 2021
Date Added to IEEE Xplore: 20 January 2022
ISBN Information:
Conference Location: Tebessa, Algeria

Contact IEEE to Subscribe

References

References is not available for this document.