Authentication and Authorization for the Internet of Things
By Lori Cameron
 

connected industrial security icons

Authentication and authorization are essential parts of basic security processes and are sorely needed in the Internet of Things (IoT).

The emergence of edge and fog computing creates new opportunities for security and trust management in the IoT.

In the article, “Authentication and Authorization for the Internet of Things,” (login may be required for full text) which appears in the September/October 2017 issue of IT Professional, the authors discuss existing solutions to establish and manage trust in networked systems and argue that these solutions face daunting challenges when scaled to the IoT.

They give a vision of efficient and scalable trust management for the IoT based on locally centralized, globally distributed trust management using an open source infrastructure with local authentication and authorization entities to be deployed on edge devices.

 


 

About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.