Skip to main content

Secure and authenticated access to LLN resources through policy constraints.

Rantos, K., Fysarakis, K., Soultatos, O. and Askoxylakis, I., 2015. Secure and authenticated access to LLN resources through policy constraints. In: 9th IFIP WG 11.2 International Conference, WISTP 2015, 24-25 August 2015, Heraklion, Crete, Greece, 271 - 280.

Full text available as:

WISTP_PBAC_Auth. accepted.pdf - Accepted Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.


DOI: 10.1007/978-3-319-24018-3_18


Ubiquitous devices comprising several resource-constrained sensors and actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living. Their intrinsic resource limitations however constitute critical requirements, such as security, a great challenge. When these nodes are associated with applications that might have an impact in user’s privacy or even become life threatening, the security issues are of primary concern. Access to these resources should be appropriately controlled to ensure that such wearable nodes are adequately protected. On the other hand, it is very important to not restrict access to only a very closed group of entities. This work presents a service oriented architecture that utilizes policy-based, unified, cross-platform and flexible access control to allow authenticated entities consume the services provided by wearable nodes while protecting their valuable resources.

Item Type:Conference or Workshop Item (Paper)
Additional Information:Lecture Notes in Computer Science 2015 9311
Group:Faculty of Science & Technology
ID Code:24617
Deposited By: Symplectic RT2
Deposited On:12 Sep 2016 10:59
Last Modified:14 Mar 2022 13:58


Downloads per month over past year

More statistics for this item...
Repository Staff Only -