Group-Based Authentication Methods in The OneM2M Ecosystem
نویسندگان
چکیده
The essential element of the Internet Things (IoT) environment, number devices has traditionally exceeded connected to Internet. This situation is considered positive for IoT concept but still negative consequences. Undoubtedly, most prominent and important among these results security constructed environment. Group-based authentication authorization methods are crucial ensure safety many In this study, “auth” mechanism that performs group-based processes, serving from first moment when in environment included system until they leave system, been developed. development process mechanism, Mobius platform, which evaluated as a golden sample by oneM2M global organization developed an open-source code, taken basis. tested three different test environments, including simulation, physical, cloud were using five scenarios. By group management module provided service platform mechanism's together, it observed computational overhead on signal traffic provide up 4 times efficiency according performance measurements. With with flexible structure, can be operated independently server allow-ing interoperability between oneM2M-based platforms.
منابع مشابه
Investigating Anonymity in Group Based Anonymous Authentication
In this paper we discuss anonymity in context of group based anonymous authentication (GBAA). Methods for GBAA provide mechanisms such that a user is able to prove membership in a group U ′ ⊆ U of authorized users U to a verifier, whereas the verifier does not obtain any information on the actual identity of the authenticating user. They can be used in addition to anonymous communication channe...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملThreats to 5G Group-based Authentication
The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, ...
متن کاملreflections on taught courses of the iranian ma program in english translation: a mixed-methods study
the issue of curriculum and syllabus evaluation and revision has been in center of attention right from when curriculum came into attention of educational institutions. thus everywhere in the world in educational institutions curricula and syllabi are evaluated and revised based on the goals, the needs, existing content, etc.. in iran any curriculum is designed in a committee of specialists and...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Advanced Research in Natural and Applied Sciences
سال: 2022
ISSN: ['2757-5195']
DOI: https://doi.org/10.28979/jarnas.1034534