Ajou University repository

Home IoT Authority Control Method Based on DID Auth
Citations

SCOPUS

0

Citation Export

Publication Year
2023-01-01
Journal
International Conference on Ubiquitous and Future Networks, ICUFN
Publisher
IEEE Computer Society
Citation
International Conference on Ubiquitous and Future Networks, ICUFN, Vol.2023-July, pp.94-99
Keyword
AuthenticationBlockchainDIDHome IoTSecurityVC·VP
Mesh Keyword
Authority controlsBlock-chainControl accessControl methodsDecentralisedDecentralized identifierHome IoTSecuritySecurity challengesVerifiable credential·verifiable presentation
All Science Classification Codes (ASJC)
Computer Networks and CommunicationsComputer Science ApplicationsHardware and Architecture
Abstract
The Home IoT device market is expanding rapidly, which has led to the increasing adoption of these devices in the home. However, IoT devices have long been challenged by various vulnerabilities and pose unique security challenges compared to other devices. This paper aims to redefine the process of entering the Home IoT environment by leveraging Decentralized Identifier(DID) authentication, and proposes a comprehensive approach to using Verifiable Credential(VC) and Verifiable Presentation(VP) to control access from outsiders like visitors. Through security analysis, this paper also highlights how these authentication and permission controls address traditional vulnerabilities and provide improved security over traditional IoT authentication methods. The results of this study shed light on the significant impact this methodology can have on the security of the Home IoT environment.
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/36966
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85169291203&origin=inward
DOI
https://doi.org/10.1109/icufn57995.2023.10200331
Journal URL
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6598371
Type
Conference
Funding
This research was supported in part by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2021-0-01835) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation), MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2023-2018-0-01396) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation),Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE) (P00 08703, The Competency Development Program for Industry Specialist), National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT (2021R1F1A1045861) and Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT)(2021-0-00590, Decentralized High Performance Consensus for Large-Scale Blockchains)
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Kim, Ki-Hyung  Image
Kim, Ki-Hyung 김기형
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.