With the widespread use of the Internet of Things (IoT), the security problem has raised social attention. Due to the limited calculation ability of the constrained device, it is difficult to download the defense software inside and the device just can use the built-in encryption mechanisms to defend attack. To overcome complex and volatile situations and challenges in the IoT, we propose a the solution based on a framework called Authentication and Authorization for Constrained Environment (ACE)-OAuth for authentication and authorization which could be applied in the IoT environment. More specifically, we implement the DTLS profile and Internet Engineering Task Force (IETF) IoT stack in ACE framework to build a secure environment in the tr...
The Internet-of-Things (IoT) is the next wave of innovation that promises to improve and optimize ou...
International audienceIn this paper we propose a new authorization and authentication framework for ...
For many Internet of Things (IoT) devices security have not been a priority during the development, ...
With the widespread use of the Internet of Things (IoT), the security problem has raised social atte...
With the widespread use of the Internet of Things (IoT), the security problem has raised social atte...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
The internet of Things technology is expected to generate tremendous economic benefits; this promise...
The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grai...
The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grai...
The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grai...
The Internet-of-Things (IoT) is the next wave of innovation that promises to improve and optimize ou...
The Internet-of-Things (IoT) is the next wave of innovation that promises to improve and optimize ou...
International audienceIn this paper we propose a new authorization and authentication framework for ...
For many Internet of Things (IoT) devices security have not been a priority during the development, ...
With the widespread use of the Internet of Things (IoT), the security problem has raised social atte...
With the widespread use of the Internet of Things (IoT), the security problem has raised social atte...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
IoT-devices are becoming more advanced and powerful than ever, and the applicationpotential is incre...
The internet of Things technology is expected to generate tremendous economic benefits; this promise...
The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grai...
The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grai...
The Authentication and Authorization for Constrained Environments (ACE) framework provides fine-grai...
The Internet-of-Things (IoT) is the next wave of innovation that promises to improve and optimize ou...
The Internet-of-Things (IoT) is the next wave of innovation that promises to improve and optimize ou...
International audienceIn this paper we propose a new authorization and authentication framework for ...
For many Internet of Things (IoT) devices security have not been a priority during the development, ...