Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Identity Management for Internet of Things

Posted By: readerXXI
Identity Management for Internet of Things

Identity Management for Internet of Things
by Poonam N. Railkar and Parikshit N. Mahalle
English | 2015 | ISBN: 8793102909 | 185 Pages | PDF | 17 MB

The Internet of Things is a wide-reaching network of devices that can intercommunicate and collaborate with each other to produce a variety of services in any way at any time and place. Maintaining access control and authentication and managing the identity of devices while they interact with other devices, services, and people is an important challenge for identity management which presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and that the applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis.

Identity Management for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for identity management and presents different identity management models. This book also presents the relationship between identity and trust and different approaches for trust management, authentication, and access control.Key milestones identified for Identitymanagement are clustering with hierarchical addressing, trust management, mutual authentication and access control.

Technical topics discussed in the book include:

• Internet of Things;
• Identity Management;
• Identity models in Internet of Things;
• Identity management and trust in the Internet of Things context;
• Authentication and access control

Identity Management for Internet of Things is ideal for personnel in computer/communication industries as well as academic staff and master/research students in wireless communication, computer science, operational research, electrical engineering and telecommunication systems Internet, and cloud computing.