With the increasing number of IoT devices deployed, the problem of switching ownership of devices is becoming more apparent. Especially, there is a need for transfer protocols not only addressing a single unit ownership transfer but secure transfer of a complete infrastructure of IoT units including also resource constraint devices. In this paper we present our novel ownership transfer protocol for an infrastructure of IoT devices. The protocol is light-weight as it only uses symmetric key operations on the IoT side. The ownership transfer protocol is carefully security evaluated both using a theoretical analysis and with automatic protocol verification. In addition, we show the feasibility of the ownership transfer protocol through a proof...
International audienceThe Internet of Things (IoT) is a network made up of a large number of devices...
The Internet of Things (IoT) has set off a new information technology revolution due to its convenie...
The Internet of Things prompt deployment enhances the security concerns of these systems in recent y...
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for I...
In this paper, we address the problem of ownership transfer of RFID tagged objects in Internet of Th...
The prevalence of Internet of Things (IoT) requires flexible and fine-grained controls over the IoT ...
In ubiquitous computing devices, users tend to store some valuable information in their device. Even...
Considering the increasing deployment of smart home IoT devices, their ownership is likely to change...
[[abstract]]Due to the advancement of convenience technology for people, the era of Internet of Thin...
Part 3: Selected PapersInternational audienceConsidering the increasing deployment of smart home IoT...
This paper explores the concept and applications of electronic ownership and ownership management in...
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including ...
Now a days almost everybody is having a portable communication device, be it a laptop, a tablet or s...
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that...
International audienceThe Internet of Things (IoT) has overturned the information technology world. ...
International audienceThe Internet of Things (IoT) is a network made up of a large number of devices...
The Internet of Things (IoT) has set off a new information technology revolution due to its convenie...
The Internet of Things prompt deployment enhances the security concerns of these systems in recent y...
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for I...
In this paper, we address the problem of ownership transfer of RFID tagged objects in Internet of Th...
The prevalence of Internet of Things (IoT) requires flexible and fine-grained controls over the IoT ...
In ubiquitous computing devices, users tend to store some valuable information in their device. Even...
Considering the increasing deployment of smart home IoT devices, their ownership is likely to change...
[[abstract]]Due to the advancement of convenience technology for people, the era of Internet of Thin...
Part 3: Selected PapersInternational audienceConsidering the increasing deployment of smart home IoT...
This paper explores the concept and applications of electronic ownership and ownership management in...
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including ...
Now a days almost everybody is having a portable communication device, be it a laptop, a tablet or s...
The Internet of Things (IoT) consists of a range of devices that communicate with other devices that...
International audienceThe Internet of Things (IoT) has overturned the information technology world. ...
International audienceThe Internet of Things (IoT) is a network made up of a large number of devices...
The Internet of Things (IoT) has set off a new information technology revolution due to its convenie...
The Internet of Things prompt deployment enhances the security concerns of these systems in recent y...