SlideShare a Scribd company logo
A Model to Enable
Application-scoped Access Control
as a Service for IoT Using OAuth 2.0
Federico Fernández (Technical University of Madrid),
Álvaro Alonso (Technical University of Madrid),
Lourdes Marco (Technical University of Madrid),
Joaquín Salvachúa (Technical University of Madrid)
Special Session: Trust and Access
Control for the Internet of Things
March 8, 2017
Outline
1. Introduction
• Interaction between services and IoT devices
• Requirements
2. Contribution
• As-a-service access control using OAuth 2.0
• Main components of our model
3. Conclusions
• Achievements
• Future lines
2March 8, 2017
Special Session: Trust and Access
Control for the Internet of Things
Securing interactions IoT↔Services
• Devices in IoT interact
with services
– Sensors: publish information
– Actuators: read information
• Requirements to secure
these interactions
– Application-scoped
– Client-independent
– Flexible
– Delegated
3March 8, 2017
Special Session: Trust and Access
Control for the Internet of Things
4March 8, 2017
Special Session: Trust and Access
Control for the Internet of Things
As-a-service AC using OAuth 2.0
• Identity Provider (IdP)
– Credentials (username+password)
– Groups of devices
– Role assignment
– Service registration (OAuth 2.0 credentials)
• Policy Administration Point (PAP)
– Permissions & roles management
• Policy Enforcement Point (PEP)
– Roles information retrieval from IdP
– One for each service
• Policy Decision Point (PDP)
– Policies fetch from database to make final decision
5March 8, 2017
Special Session: Trust and Access
Control for the Internet of Things
As-a-service AC using OAuth 2.0
• Enable access control in IoT contexts
• OAuth 2.0 protocol
– Interoperability with other RESTful services
– Light for devices
• An as-a-service authorization layer that can be added
• Centrally-managed policies
Future lines
• Implement and validate
– Already on-going in the scope of FIWARE
6March 8, 2017
Special Session: Trust and Access
Control for the Internet of Things
Conclusions
Thank you!
#ICIN2017
Special Session: Trust and Access
Control for the Internet of Things
March 8, 2017

More Related Content

DOCX
International Journal of Network Security &Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
Call for Papers - 6th International Conference on Cryptography and Informatio...
DOCX
International Journal of Network Security & Its Applications (IJNSA)
PDF
6th International Conference on Cryptography and Information Security (CRIS 2...
DOCX
International Journal of Network Security & Its Applications (IJNSA)
PDF
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
Call for Papers - 6th International Conference on Cryptography and Informatio...
International Journal of Network Security & Its Applications (IJNSA)
6th International Conference on Cryptography and Information Security (CRIS 2...
International Journal of Network Security & Its Applications (IJNSA)
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...

What's hot (17)

DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
DOCX
6th International Conference on Cryptography and Information Security (CRIS 2...
DOCX
International Journal of Network Security & Its Applications (IJNSA)
PDF
6th International Conference on Cryptography and Information Security (CRIS 2...
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
DOCX
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
6th International Conference on Cryptography and Information Security (CRIS 2...
International Journal of Network Security & Its Applications (IJNSA)
6th International Conference on Cryptography and Information Security (CRIS 2...
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
Ad

Viewers also liked (20)

PDF
Semiconductor industry for IoT Entrepreneurs
PDF
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
PPTX
How to Install and Configure your own Identity Manager GE
PPTX
EU data protection issues in IoT
PPTX
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
PPTX
FIWARE NGSI: Managing Context Information at Large Scale
PDF
IBM Aspera - Moving the world’s data at maximum speed
PPTX
Fine grained access control for cloud-based services using ABAC and XACML
PPTX
Blind spots in big data erez koren @ forter
PPTX
Welcome to the 1st FIWARE Summit
PDF
Capacitive Fingerprint Sensors Sample
PDF
Biomedical Photoacoustic Imaging Patent Landscape Sample
PDF
Honeywell Microbolometer Patent Landscape Sample
PDF
Non invasive Glucose Patent Landscape sample
PDF
Sample Resistive Memory Patent Landscape
PDF
TSV Stacked Memory Patent Landscape Sample
PDF
Microbattery Patent Landscape Sample
PDF
Microfluidic technologies for diagnostic applications - Sample
PDF
Miniaturized Gas Sensors Patent Landscape 2016 Sample
PDF
Capsule endoscopy Patent Landscape 2014 Sample
Semiconductor industry for IoT Entrepreneurs
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
How to Install and Configure your own Identity Manager GE
EU data protection issues in IoT
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
FIWARE NGSI: Managing Context Information at Large Scale
IBM Aspera - Moving the world’s data at maximum speed
Fine grained access control for cloud-based services using ABAC and XACML
Blind spots in big data erez koren @ forter
Welcome to the 1st FIWARE Summit
Capacitive Fingerprint Sensors Sample
Biomedical Photoacoustic Imaging Patent Landscape Sample
Honeywell Microbolometer Patent Landscape Sample
Non invasive Glucose Patent Landscape sample
Sample Resistive Memory Patent Landscape
TSV Stacked Memory Patent Landscape Sample
Microbattery Patent Landscape Sample
Microfluidic technologies for diagnostic applications - Sample
Miniaturized Gas Sensors Patent Landscape 2016 Sample
Capsule endoscopy Patent Landscape 2014 Sample
Ad

Similar to A Model to Enable Application-scoped Access Control as a Service for IoT Using OAuth2.0 (20)

PDF
IoT/M2M Security
PPTX
Authorization for Internet of Things using OAuth 2.0
PPTX
Anonymous Individual Integration for IoT
PDF
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
PPTX
Securing the Internet of Things
PDF
Security in Cyber-Physical Systems
PDF
The Future of Authentication for IoT
PDF
IRJET- Authentication and Context Awareness Access Control in Internet of Things
PDF
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
PDF
IERC_Position_Paper_IoT_Governance_Privacy_Security_Final.pdf
PDF
Internet of Things (IoT) Security Measures Insights from Patents
PPTX
Security challenges for internet of things
PDF
Securing IoT Applications
PDF
RISE OF THE MACHINES: IRM IN AN IOT WORLD
PPTX
Onboarding in the IoT
PDF
IoT Security and Privacy Considerations
PDF
1 importance of light weight authentication in iot
PDF
inteross-iot.pdf
PDF
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
PDF
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
IoT/M2M Security
Authorization for Internet of Things using OAuth 2.0
Anonymous Individual Integration for IoT
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Securing the Internet of Things
Security in Cyber-Physical Systems
The Future of Authentication for IoT
IRJET- Authentication and Context Awareness Access Control in Internet of Things
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
IERC_Position_Paper_IoT_Governance_Privacy_Security_Final.pdf
Internet of Things (IoT) Security Measures Insights from Patents
Security challenges for internet of things
Securing IoT Applications
RISE OF THE MACHINES: IRM IN AN IOT WORLD
Onboarding in the IoT
IoT Security and Privacy Considerations
1 importance of light weight authentication in iot
inteross-iot.pdf
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
KodekX | Application Modernization Development
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx
KodekX | Application Modernization Development
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Mobile App Security Testing_ A Comprehensive Guide.pdf
sap open course for s4hana steps from ECC to s4
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf

A Model to Enable Application-scoped Access Control as a Service for IoT Using OAuth2.0

  • 1. A Model to Enable Application-scoped Access Control as a Service for IoT Using OAuth 2.0 Federico Fernández (Technical University of Madrid), Álvaro Alonso (Technical University of Madrid), Lourdes Marco (Technical University of Madrid), Joaquín Salvachúa (Technical University of Madrid) Special Session: Trust and Access Control for the Internet of Things March 8, 2017
  • 2. Outline 1. Introduction • Interaction between services and IoT devices • Requirements 2. Contribution • As-a-service access control using OAuth 2.0 • Main components of our model 3. Conclusions • Achievements • Future lines 2March 8, 2017 Special Session: Trust and Access Control for the Internet of Things
  • 3. Securing interactions IoT↔Services • Devices in IoT interact with services – Sensors: publish information – Actuators: read information • Requirements to secure these interactions – Application-scoped – Client-independent – Flexible – Delegated 3March 8, 2017 Special Session: Trust and Access Control for the Internet of Things
  • 4. 4March 8, 2017 Special Session: Trust and Access Control for the Internet of Things As-a-service AC using OAuth 2.0
  • 5. • Identity Provider (IdP) – Credentials (username+password) – Groups of devices – Role assignment – Service registration (OAuth 2.0 credentials) • Policy Administration Point (PAP) – Permissions & roles management • Policy Enforcement Point (PEP) – Roles information retrieval from IdP – One for each service • Policy Decision Point (PDP) – Policies fetch from database to make final decision 5March 8, 2017 Special Session: Trust and Access Control for the Internet of Things As-a-service AC using OAuth 2.0
  • 6. • Enable access control in IoT contexts • OAuth 2.0 protocol – Interoperability with other RESTful services – Light for devices • An as-a-service authorization layer that can be added • Centrally-managed policies Future lines • Implement and validate – Already on-going in the scope of FIWARE 6March 8, 2017 Special Session: Trust and Access Control for the Internet of Things Conclusions
  • 7. Thank you! #ICIN2017 Special Session: Trust and Access Control for the Internet of Things March 8, 2017

Editor's Notes

  • #4: Hablar de related work!