Ajou University repository

Home IoT Authority Control Method Based on DID Auth
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorChoi, Jae Ho-
dc.contributor.authorIm, Jun Hyuk-
dc.contributor.authorSong, Hae Jun-
dc.contributor.authorKim, Ki Hyung-
dc.date.issued2023-01-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36966-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85169291203&origin=inward-
dc.description.abstractThe Home IoT device market is expanding rapidly, which has led to the increasing adoption of these devices in the home. However, IoT devices have long been challenged by various vulnerabilities and pose unique security challenges compared to other devices. This paper aims to redefine the process of entering the Home IoT environment by leveraging Decentralized Identifier(DID) authentication, and proposes a comprehensive approach to using Verifiable Credential(VC) and Verifiable Presentation(VP) to control access from outsiders like visitors. Through security analysis, this paper also highlights how these authentication and permission controls address traditional vulnerabilities and provide improved security over traditional IoT authentication methods. The results of this study shed light on the significant impact this methodology can have on the security of the Home IoT environment.-
dc.description.sponsorshipThis research was supported in part by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2021-0-01835) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation), MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2023-2018-0-01396) supervised by the IITP(Institute for Information & Communications Technology Planning & Evaluation),Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE) (P00 08703, The Competency Development Program for Industry Specialist), National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT (2021R1F1A1045861) and Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT)(2021-0-00590, Decentralized High Performance Consensus for Large-Scale Blockchains)-
dc.language.isoeng-
dc.publisherIEEE Computer Society-
dc.subject.meshAuthority controls-
dc.subject.meshBlock-chain-
dc.subject.meshControl access-
dc.subject.meshControl methods-
dc.subject.meshDecentralised-
dc.subject.meshDecentralized identifier-
dc.subject.meshHome IoT-
dc.subject.meshSecurity-
dc.subject.meshSecurity challenges-
dc.subject.meshVerifiable credential·verifiable presentation-
dc.titleHome IoT Authority Control Method Based on DID Auth-
dc.typeConference-
dc.citation.conferenceDate2023.7.4. ~ 2023.7.7.-
dc.citation.conferenceName14th International Conference on Ubiquitous and Future Networks, ICUFN 2023-
dc.citation.editionICUFN 2023 - 14th International Conference on Ubiquitous and Future Networks-
dc.citation.endPage99-
dc.citation.startPage94-
dc.citation.titleInternational Conference on Ubiquitous and Future Networks, ICUFN-
dc.citation.volume2023-July-
dc.identifier.bibliographicCitationInternational Conference on Ubiquitous and Future Networks, ICUFN, Vol.2023-July, pp.94-99-
dc.identifier.doi10.1109/icufn57995.2023.10200331-
dc.identifier.scopusid2-s2.0-85169291203-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6598371-
dc.subject.keywordAuthentication-
dc.subject.keywordBlockchain-
dc.subject.keywordDID-
dc.subject.keywordHome IoT-
dc.subject.keywordSecurity-
dc.subject.keywordVC·VP-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaComputer Science Applications-
dc.subject.subareaHardware and Architecture-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Kim, Ki-Hyung  Image
Kim, Ki-Hyung 김기형
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.