期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Hybrid IoT Security Model of MQTT and UMA
1
作者 Khalid S. Aloufi Omar H. Alhazmi 《Communications and Network》 2020年第4期155-173,共19页
IoT applications are promising for future daily activities;therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furth... IoT applications are promising for future daily activities;therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furthermore, IoT applications require higher security standards. In this work, an IoT application framework is presented with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA). The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The security in the model is a built-in feature in its structure. The model is built on recommended frameworks;therefore, it is ready for integration with other web standards for data sharing, which will help in making IoT applications integrated from different developing parties. 展开更多
关键词 IOT MQTT (Message Queuing Telemetry Transport) UMA (user-managed Access) Network Security Smart City
在线阅读 下载PDF
Performance Analysis of the Hybrid MQTT/UMA and Restful IoT Security Model
2
作者 Omar H. Alhazmi Khalid S. Aloufi 《Advances in Internet of Things》 2021年第1期26-41,共16页
Internet of Things (IoT) environments are being deployed all over the globe. They have the potential to form solutions to applications, from small scale applications to national and international ones. Therefore, scal... Internet of Things (IoT) environments are being deployed all over the globe. They have the potential to form solutions to applications, from small scale applications to national and international ones. Therefore, scalability, performance, and security form a triangle of requirements that must be carefully set. Furthermore, IoT applications require higher security standards. A previously proposed IoT application framework with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA) is analyzed in this work. The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The results and analysis showed that the built-in security model had performed better than models with other frameworks, especially with fog implementation. 展开更多
关键词 IOT MQTT (Message Queuing Telemetry Transport) UMA (user-managed Access) Network Security
在线阅读 下载PDF
Blockchain-based cross-domain authorization system for user-centric resource sharing
3
作者 Yuki Ezawa Shohei Kakei +2 位作者 Yoshiaki Shiraishi Masami Mohri Masakatu Morii 《Blockchain(Research and Applications)》 EI 2023年第2期67-81,共15页
User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Neverth... User-centric data sharing is essential to encourage citizens'active participation in the digital economy.One key to smart cities,a form of the digital economy,is the promotion of public use of citizen data.Nevertheless,it is not easy to utilize data without citizens’consent.In this study,we took a technological approach to these issues.Usermanaged access(UMA)is a well-known framework for delegating resource access rights to others on the Internet.In UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different domains.However,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart cities.In this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each other.The proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain technology.We implemented the proposed architecture as smart contracts and evaluated its processing performance.The resultant time required for delegating access rights and accessing resources was less than 500 ms.Furthermore,we found that the fluctuation in the processing time overhead was small.Based on these results,we concluded that performance degradation with the proposed architecture is minor. 展开更多
关键词 Access control AUTHORIZATION Blockchain Hyperledger fabric user-managed access
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部