Responsibility and Non-repudiation in resource-constrained Internet of Things scenarios

Edewede Oriwoh, Haider Al-Khateeb, Marc Conrad

Research output: Chapter in Book/Published conference outputConference publication

Abstract

The proliferation and popularity of smart autonomous systems necessitates the development of methods and models for ensuring the effective identification of their owners and controllers. The aim of this paper is to critically discuss the responsibility of Things and their impact on human affairs. This starts with an in-depth analysis of IoT Characteristics such as Autonomy, Ubiquity and Pervasiveness. We argue that Things governed by a controller should have an identifiable relationship between the two parties and that authentication and non-repudiation are essential characteristics in all IoT scenarios which require trustworthy communications. However, resources can be a problem, for instance, many Things are designed to perform in low-powered hardware. Hence, we also propose a protocol to demonstrate how we can achieve the authenticity of participating Things in a connectionless and resource-constrained environment.
Original languageEnglish
Title of host publicationResponsibility and Non-repudiation in resource-constrained Internet of Things scenarios
Number of pages7
DOIs
Publication statusPublished - 2016
EventInternational Conference on Computing and Technology Innovation (CTI 2015) - University of Bedfordshire, Luton, United Kingdom, Luton, United Kingdom
Duration: 27 May 201528 May 2015

Conference

ConferenceInternational Conference on Computing and Technology Innovation (CTI 2015)
Country/TerritoryUnited Kingdom
CityLuton
Period27/05/1528/05/15

Keywords

  • Internet of Things
  • Characteristics
  • Protocol
  • Responsibility
  • Liability
  • Authentication
  • Identification
  • Public Key Cryptography
  • Cyber-Physical Environment

Fingerprint

Dive into the research topics of 'Responsibility and Non-repudiation in resource-constrained Internet of Things scenarios'. Together they form a unique fingerprint.

Cite this