2014 International Workshop on Secure Internet of Things

10-10 Sept. 2014

Filter Results

Displaying Results 1 - 15 of 15
  • Cover Art

    Publication Year: 2014, Page(s): C4
    Request permission for reuse | PDF file iconPDF (804 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Copyright Page

    Publication Year: 2014, Page(s): iv
    Request permission for reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2014, Page(s): v
    Request permission for reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2014, Page(s): vi
    Request permission for reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2014, Page(s): vii
    Request permission for reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Access Control for Apps Running on Constrained Devices in the Internet of Things

    Publication Year: 2014, Page(s):1 - 9
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    The increasing interest in applications for the Internet of Things (IoT) has led to the widespread use of efficient but limited operating systems like Contiki OS. Applications running on constrained devices in the IoT should only be able to access those resources which are specified by the user. While on mobile platforms such as the Google Android and the Apple iOS various access control mechanism... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Federated Identity and Access Management for the Internet of Things

    Publication Year: 2014, Page(s):10 - 17
    Cited by:  Papers (28)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1949 KB) | HTML iconHTML

    We examine the use of Federated Identity and Access Management (FIAM) approaches for the Internet of Things (IoT). We look at specific challenges that devices, sensors and actuators have, and look for approaches to address them. OAuth is a widely deployed protocol -- built on top of HTTP -- for applying FIAM to Web systems. We explore the use of OAuth for IoT systems that instead use the lightweig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight Display Virtualization For Mobile Devices

    Publication Year: 2014, Page(s):18 - 25
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Recent years have witnessed a constant evolution of mobile systems, from hardware improvements such as multi-core CPUs and virtualization extensions, to a rise in software complexity, including application stores that are the home for millions of mobile applications. This enables and encourages the rising trend of mobile virtualization. In this paper we present an approach for providing lightweigh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Key Generating Architecture for Wireless Low-Resource Devices

    Publication Year: 2014, Page(s):26 - 34
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1824 KB) | HTML iconHTML

    Secret key establishment based on parameters of the communication channel is a highly attractive option for many applications that operate in a dynamic mobile environment with peer-to-peer association. On the other hand, high usability and dynamic key management are still very difficult to achieve for wireless devices which have to operate under strict resource constraints. In fact, most previousl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threat-Based Security Analysis for the Internet of Things

    Publication Year: 2014, Page(s):35 - 43
    Cited by:  Papers (25)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    The Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. This technology is anticipated to become an integral milestone in the development of smart homes and smart cities. For any technology to be successful and achieve widespread use, it needs to gain the trust of users by providing adequate security and privacy ass... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UNCHAIN - Ubiquitous Wireless Network Communication Architecture for Ambient Intelligence and Health Scenarios

    Publication Year: 2014, Page(s):44 - 51
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (679 KB) | HTML iconHTML

    Ambient intelligence techniques and smart Internet of Things objects are empowering healthcare professionals to provide better services based on improved vital signs data enriched with contextual information. In this paper, we provide an overview of current solutions and propose a new taxonomy for ambient and health sensor data, based on three selected metrics. The proposed UNCHAIN architecture pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author Index

    Publication Year: 2014, Page(s): 52
    Request permission for reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Publisher's Information

    Publication Year: 2014, Page(s): 54
    Request permission for reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE