idot: challenges from the identities of things landscape

Post on 28-Nov-2014

78 Views

Category:

Technology

4 Downloads

Preview:

Click to see full reader

DESCRIPTION

This is a presentation from the Kantara Initiative Identities of the Things (IDoT) Discussion Group. The presentations summarizes the findings to date of the DG for next steps and industry discussion and innovation.

TRANSCRIPT

Challenges from the Identities of Things

Kantara

Utrecht Sep 04/05th 2014

Ingo Friese, Deutsche Telekom AG,

Berlin, Germany

A closer look at the Identities of Things.Agenda.

Exemplary IoT Scenario Object Identifier and Namespace Authentication and Authorization Ownership and Identity Relationships Governance of Data and Privacy

Exemplary IoT Scenario

Exemplary IoT Scenario:Fleet management in farming industry.

*by courtesy of Claas

Exemplary IoT Scenario:Support of farming production processes.

Harvesting Transport Processing

Object Identifier and Namespace

construction-community.org

Object Identifier and NamespaceIt needs new mechanisms to find identifier and addresses of communication partners in the IoT.

„Yellow Machine Inc.“

serial no. as identifiere.g. #123abc

„ABC Construction Inc.“

license plateas identifier

e.g. B-BC1234

Example XRIxri://construction-community.org/(urn:yelllowMachine.serialno:#123abc)xri://construction-community.org/(urn:abcConst.license:#B-BC1234)

How to address?

Authenticationand

Authorization

Authentication and AuthorizationProper IdM mechanisms become paramount in the IoT.

Strong Authentication 1/2How to strengthen authentication means in the IoT?

Something you

know + have + are

User Identities

Something you

?

Identities of Things

know + have + are

Strong Authentication 2/2Context-based authentication.

Additional information could be taken e.g. from the network layer, from geographical information or from other use case specific factors.

Authorization 1/2OAuth – Authorization for the “classic” Internet.

Token Request

User Login & Consent

Application AuthorizationServer

ResourceServer /

API Endpoint

Code

Exchange Code for Token

Token Response

Call API / Get Resource w/ token

User has to be online !

User

Authorization 2/2User Managed Access - Authorization for the IoT(?)

Token Request

Application AuthorizationServer

ResourceServer /

API Endpoint

Code

Exchange Code for Token

Token Response

Call API / Get Resource w/ token

Authentication & Consent

Policies and

Identity Claims

Ownership,Identity Relationships

andLifecycle

Ownership and Identity RelationshipsThings or objects in the IoT often have a relationship to real persons.

Identity relationships in the IoT have an impact on other identity related processes like e.g. authentication, authorization or governance of data.

user

owner

administrator

group of usersThing

Identity of Things LifecycleIdentity lifecycles in the IoT can be muchlonger or shorter than in classic user-related IdM.

In the Internet of Things objects have very different lifetimes ranging from years or decades down to days or minutes.

ID creationprovisioning

ID update

ID update

ID revocationde-provisionig

Governance of Dataand

Privacy

Governance of Data and PrivacyThe problem.

……PositionVelocity

Usage of GasOil temperaturOil pressureEngine status

Data producedin a IoT device

GPS

user

owner

Persons havingdifferent claims

to data

Sensors

„I want to use the position data forstatistics!“

„I don‘t want the position data to beused. They could beused to track mypersonal behavior“

Claims to data

Governance of Data and PrivacyUsers have their claims-to data.

user

ownerData sink 1

Sensor

Data sink 2

Appropriate methodsto be applied to the data

discard encrypt end-2-end

publish anonymize

Persons havingdifferent claims

to data

Governance of Data and PrivacyThe configurable “claims-to” approach.

……Position

Velocity

Usage of Gas

Oil temperatur…

encrypt end-2-end

anonymize

discard

publish

Different configurations in different domains, regions and countries.

Questions?

top related