Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

How to design a privacy ensured IoT system?

What are key concepts for Identity in Kantara Initiative that can be also used in the IoT?

Is the hugh address pool of IPv6 a soltution for Identities in IoT?

A thing is not always just one thing. Can a thing be composed of other things?

Anchor
1
1

What are the challenges of Identiy in the Internet of Things?

...

The are various design startegies and architecture concepts to ensure privacy in communication and during resource access control. The Identity of Thing Discussion Group supports IEEE P2413 IoT Architecture Working Group in writing a Privacy- and Trust Architecture View Point. This viewpoint is described in an Architecture viewpoint template of ISO/IEC/IEEE 42010:2011. This uses describes concerns and models to frame the viewpoint. Find here the: current concerns of the Privacy and Trust Architecture Viewpoint. This first draft of the complete P2413 architecture draft is (propably) published End of 2017.

 

Anchor
8
8

What are key concepts for Identity in Kantara Initiative that can be also used in the IoT (tbd)?

User Managed Access (UMA): UMA is a profil on top of OAuth....tbd

...

Things or objects in the IoT often have a relationship to real persons. These could be owner(s), manufacturer(s), user(s), administrator(s) or many other functions. A product might be owned by a manufacturer first and subsequently by a user who bought the product. The owner, user or administrator of an object might change over time. Ownership and identity relationships in the IoT have an impact on other identity related processes like e.g. authentication, authorization. The owner of a thing might be challenged for authentication or be asked for authorization policies.

User Consent Receipts

Anchor
9
9

Is the hugh address pool of IPv6 a soltution for Identities in IoT(tbd)?

 

Anchor
10
10

A thing is not always just one thing. Can a thing be composed of other things?

...

For purposes of address-ability, it likely has only a single IP address. But from the perspective of its functionality, each separate capability can be accessed and used separately.  E.g., I could leave a smartphone at home and access it remotely as a webcam to watch a baby in a crib, as a microphone to listen to the sounds in my house, as a speaker to give a direction to the babysitter, etc.

Anchor
11
11

Protection mechanisms are not new to the internet. Why there is a challenge in IoT?

...