Skip to main navigation Skip to search Skip to main content

Responsibility and non-repudiation in resource-constrained Internet of Things scenarios

Research output: Contribution to conferencePaperpeer-review

1 Downloads (Pure)

Abstract

The proliferation and popularity of smart autonomous systems necessitates the development of methods and models for ensuring the effective identification of their owners and controllers. The aim of this paper is to critically discuss the responsibility of Things and their impact on human affairs. This starts with an in-depth analysis of IoT Characteristics such as Autonomy, Ubiquity and Pervasiveness. We argue that Things governed by a controller should have an identifiable relationship between the two parties and that authentication and non-repudiation are essential characteristics in all IoT scenarios which require trustworthy communications. However, resources can be a problem, for instance, many Things are designed to perform in low-powered hardware. Hence, we also propose a protocol to demonstrate how we can achieve the authenticity of participating Things in a connectionless and resource-constrained environment.
Original languageEnglish
DOIs
Publication statusPublished - 1 Jan 2016
EventInternational Conference on Computing and Technology Innovation (CTI 2015) - Luton
Duration: 27 May 201528 May 2015

Conference

ConferenceInternational Conference on Computing and Technology Innovation (CTI 2015)
CityLuton
Period27/05/1528/05/15
OtherInternational Conference on Computing and Technology Innovation (CTI 2015) (27/05/2015-28/05/2015, Luton)

Keywords

  • Computer

Fingerprint

Dive into the research topics of 'Responsibility and non-repudiation in resource-constrained Internet of Things scenarios'. Together they form a unique fingerprint.

Cite this