Identity Management for Internet of Things

·
· River Publishers
4.0
2 reviews
Ebook
184
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

 The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis.  

Technical topics discussed in the book include:                    

 

Internet of Things; Identity Management; Identity models in Internet of Things; Identity management and trust in the Internet of Things context; Authentication and access control;

 

Identity management for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identity management and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control. Key milestones identified for 

Identity management are clustering with hierarchical addressing, trust management, mutual authentication and access control.

 

Identity management for Internet of Things is ideal for personnel in computer/communication industries as well as academic staff and master/research students in wireless communication, computer science, operational research, electrical engineering and telecommunication systems  Internet, and cloud computing.

 

Content

Preface; 1. Internet of Things Overview;  2. Elements of Internet of Things Security; 3: Identity Management Models; 4. Identity Management and Trust; 5. Identity Establishment;  6. Access Control; 7. Conclusions

 

Ratings and reviews

4.0
2 reviews

About the author

Parikshit N. Mahalle is PhD from Aalborg university and is IEEE member, ACM member, Life member ISTE and graduated in Computer Engineering from Amravati University, Maharashtra, India in 2000 and received Master in Computer Engineering from Pune University in 2007. From 2000 to 2005, was working as Assistant Professor in Vishwakarma Institute of technology, Pune, India. From August 2005, he is working as Professor and Head in Department of Computer Engineering, STES’s Smt. Kashibai Navale Col- lege of Engineering, Pune, India. He published 42 research publications at national and international journals and conferences. He has authored 5 books on subjects like Data Structures, Theory of Computations and Programming Languages. He is also the recipient of “Best Faculty Award” by STES and Cognizant Technologies Solutions. He has guided more than 100 plus under- graduate students and 10 plus post-graduate students for projects. His research interests are Algorithms, IoT, Identity Management and Security. He has also delivered invited talk on “Identity Management in IoT” to Symantec Research Lab, Mountain View, California.


Poonam N. Railkar received the Master in Computer Engineering (Com- puter Networks) from Pune University Maharashtra, India in the year 2013. From September 2012, she is currently working as an Assistant Professor in Department of Computer Engineering, STES’s Smt. Kashibai Navale College of Engineering, Pune, India. She has published 10 plus papers at national and international journals and conferences. She has guided more than 5 plus under-graduate students for projects. Her research interests are Mobile Com- puting, Identity Management, Security and Database Management System Applications. 

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.