Applying Generic Bootstrapping Architecture for use with Constrained Devices

نویسنده

  • Jouni Korhonen
چکیده

This paper discusses the possible use and required modifications of the 3GPP Generic Authentication Architecture as a security framework for constrained devices within Internet of Things deployments. The deployment architecture in this paper assumes a cellular operator running the requires backend infrastructure and also providing the wide area network access over a cellular wireless broadband. The constrained devices are not assumed to have means for accessing cellular networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model-Based Bootstrapping on Classified Tensor Morphologies using Constrained Two-Tensor Model

In this study, fast and clinically feasible model-based bootstrapping algorithms using a geometrically constrained two-tensor diffusion model are employed for estimating uncertainty in fibre-orientation. Voxels are classified based on tensor morphologies before applying single or two-tensor model-based bootstrapping algorithms. Classification of tensor morphologies allows the tensor morphology ...

متن کامل

Mobile Provided Identity Authentication on the Web

Introduction One of the key elements to improve the user experience on the Web is the enhancement of the user security, however not compromising the usability of the solutions. In that sense, the take-off of the mobile Internet, with users always carrying (in a way that was only equaled previously by keys, watches or wallets) a personal device, i.e., the mobile phone, equipped with a Subscriber...

متن کامل

Residual Bootstrapping on Classified Tensor Morphologies using Constrained Two-Tensor Model

In this study, a fast and clinically feasible residual-bootstrapping algorithm using a geometrically constrained two-tensor diffusion model is employed for estimating uncertainty in fibre orientation. Voxels are classified based on tensor morphologies before applying a single or two tensor residual-bootstrapping algorithms. Classification of tensor morphologies allows the tensor morphology to b...

متن کامل

Formal Security Analysis of OpenID with GBA Protocol

The paper presents the formal security analysis of 3GPP standardized OpenID with Generic Bootstrapping Architecture protocol which allows phone users to use OpenID services based on SIM credentials. We have used an automatic protocol analyzer to prove key security properties of the protocol. Additionally, we have analyzed robustness of the protocol under several network attacks and different th...

متن کامل

An Evaluation of Preference Clustering in Large-Scale Multicast Applications

The efficiency of using multicast in multi-party applications is constrained by preference heterogeneity, where receivers range in their preferences for application data. We examine an approach in which approximately similar sources and receivers are clustered into multicast groups. The goal is to maximize preference overlap within each group while satisfying the constraint of limited network r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012