Abstract
The proliferation and popularity of smart autonomous systems necessitates the development of methods and models for ensuring the effective identification of their owners and controllers. The aim of this paper is to critically discuss the responsibility of Things and their impact on human affairs. This starts with an in-depth analysis of IoT Characteristics such as Autonomy, Ubiquity and Pervasiveness. We argue that Things governed by a controller should have an identifiable relationship between the two parties and that authentication and non-repudiation are essential characteristics in all IoT scenarios which require trustworthy communications. However, resources can be a problem, for instance, many Things are designed to perform in low-powered hardware. Hence, we also propose a protocol to demonstrate how we can achieve the authenticity of participating Things in a connectionless and resource-constrained environment.
| Original language | English |
|---|---|
| DOIs | |
| Publication status | Published - 1 Jan 2016 |
| Event | International Conference on Computing and Technology Innovation (CTI 2015) - Luton Duration: 27 May 2015 → 28 May 2015 |
Conference
| Conference | International Conference on Computing and Technology Innovation (CTI 2015) |
|---|---|
| City | Luton |
| Period | 27/05/15 → 28/05/15 |
| Other | International Conference on Computing and Technology Innovation (CTI 2015) (27/05/2015-28/05/2015, Luton) |
Keywords
- Computer
Fingerprint
Dive into the research topics of 'Responsibility and non-repudiation in resource-constrained Internet of Things scenarios'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver