Applying Generic Bootstrapping Architecture for use with Constrained Devices
نویسنده
چکیده
This paper discusses the possible use and required modifications of the 3GPP Generic Authentication Architecture as a security framework for constrained devices within Internet of Things deployments. The deployment architecture in this paper assumes a cellular operator running the requires backend infrastructure and also providing the wide area network access over a cellular wireless broadband. The constrained devices are not assumed to have means for accessing cellular networks.
منابع مشابه
Model-Based Bootstrapping on Classified Tensor Morphologies using Constrained Two-Tensor Model
In this study, fast and clinically feasible model-based bootstrapping algorithms using a geometrically constrained two-tensor diffusion model are employed for estimating uncertainty in fibre-orientation. Voxels are classified based on tensor morphologies before applying single or two-tensor model-based bootstrapping algorithms. Classification of tensor morphologies allows the tensor morphology ...
متن کاملMobile Provided Identity Authentication on the Web
Introduction One of the key elements to improve the user experience on the Web is the enhancement of the user security, however not compromising the usability of the solutions. In that sense, the take-off of the mobile Internet, with users always carrying (in a way that was only equaled previously by keys, watches or wallets) a personal device, i.e., the mobile phone, equipped with a Subscriber...
متن کاملResidual Bootstrapping on Classified Tensor Morphologies using Constrained Two-Tensor Model
In this study, a fast and clinically feasible residual-bootstrapping algorithm using a geometrically constrained two-tensor diffusion model is employed for estimating uncertainty in fibre orientation. Voxels are classified based on tensor morphologies before applying a single or two tensor residual-bootstrapping algorithms. Classification of tensor morphologies allows the tensor morphology to b...
متن کاملFormal Security Analysis of OpenID with GBA Protocol
The paper presents the formal security analysis of 3GPP standardized OpenID with Generic Bootstrapping Architecture protocol which allows phone users to use OpenID services based on SIM credentials. We have used an automatic protocol analyzer to prove key security properties of the protocol. Additionally, we have analyzed robustness of the protocol under several network attacks and different th...
متن کاملAn Evaluation of Preference Clustering in Large-Scale Multicast Applications
The efficiency of using multicast in multi-party applications is constrained by preference heterogeneity, where receivers range in their preferences for application data. We examine an approach in which approximately similar sources and receivers are clustered into multicast groups. The goal is to maximize preference overlap within each group while satisfying the constraint of limited network r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012