Identity and Access Management Solutions for the IoT

While society continues to adopt ever more smart home appliances and IoT wearables, the IoT is diversifying into broader applications for different professions, and governments and throughout industries. The network connectivity needed to support it is becoming ubiquitous and, to that end, devices will need to be identified and access provisioned in new and different environments and organizations. This chapter provides an introduction to identity and access management for IoT devices. The identity life cycle is reviewed, and a discussion on infrastructure components required for provisioning authentication credentials is provided, with a heavy focus on PKI. We will also examine different types of authentication credentials and discuss new approaches to providing authorization and access control for IoT devices.

We will address these subjects in the following topic areas:

  • Introductory discussion on Identity and Access Management (IAM)
  • Discussion of the identity life cycle
  • A primer on authentication credentials
  • Background on IoT IAM infrastructure
  • A discussion of IoT authorization and access control
  • Decentralized trust via blockchain ledgers

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.34.85