Group-Based Authentication Methods in The OneM2M Ecosystem

نویسندگان

چکیده

The essential element of the Internet Things (IoT) environment, number devices has traditionally exceeded connected to Internet. This situation is considered positive for IoT concept but still negative consequences. Undoubtedly, most prominent and important among these results security constructed environment. Group-based authentication authorization methods are crucial ensure safety many In this study, “auth” mechanism that performs group-based processes, serving from first moment when in environment included system until they leave system, been developed. development process mechanism, Mobius platform, which evaluated as a golden sample by oneM2M global organization developed an open-source code, taken basis. tested three different test environments, including simulation, physical, cloud were using five scenarios. By group management module provided service platform mechanism's together, it observed computational overhead on signal traffic provide up 4 times efficiency according performance measurements. With with flexible structure, can be operated independently server allow-ing interoperability between oneM2M-based platforms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating Anonymity in Group Based Anonymous Authentication

In this paper we discuss anonymity in context of group based anonymous authentication (GBAA). Methods for GBAA provide mechanisms such that a user is able to prove membership in a group U ′ ⊆ U of authorized users U to a verifier, whereas the verifier does not obtain any information on the actual identity of the authenticating user. They can be used in addition to anonymous communication channe...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Threats to 5G Group-based Authentication

The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, ...

متن کامل

reflections on taught courses of the iranian ma program in english translation: a mixed-methods study

the issue of curriculum and syllabus evaluation and revision has been in center of attention right from when curriculum came into attention of educational institutions. thus everywhere in the world in educational institutions curricula and syllabi are evaluated and revised based on the goals, the needs, existing content, etc.. in iran any curriculum is designed in a committee of specialists and...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Advanced Research in Natural and Applied Sciences

سال: 2022

ISSN: ['2757-5195']

DOI: https://doi.org/10.28979/jarnas.1034534