{"title":"物联网设备云端WiFi连接认证","authors":"Wondimu K. Zegeye, F. Moazzami","doi":"10.1109/CISS.2019.8693048","DOIUrl":null,"url":null,"abstract":"The deployment of computing devices and machines that constitute the Internet of Things (IoT) had dramatically increased in this decade. To reduce the cost of pre-deployment effort, an already existing Wi-Fi infrastructure (Access Point) can be used to grant these devices access to Internet connectivity. This paper presents the use of standard tunneled based EAP (TEAP) protocol for authenticating IoT devices from the cloud using an EAP-AKA’ inner method EAP. It mainly focuses on the deployment architecture, security against MiTM attack by exploring different RFCs associated with those protocols.","PeriodicalId":123696,"journal":{"name":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Authentication of IoT Devices for WiFi Connectivity from the Cloud\",\"authors\":\"Wondimu K. Zegeye, F. Moazzami\",\"doi\":\"10.1109/CISS.2019.8693048\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The deployment of computing devices and machines that constitute the Internet of Things (IoT) had dramatically increased in this decade. To reduce the cost of pre-deployment effort, an already existing Wi-Fi infrastructure (Access Point) can be used to grant these devices access to Internet connectivity. This paper presents the use of standard tunneled based EAP (TEAP) protocol for authenticating IoT devices from the cloud using an EAP-AKA’ inner method EAP. It mainly focuses on the deployment architecture, security against MiTM attack by exploring different RFCs associated with those protocols.\",\"PeriodicalId\":123696,\"journal\":{\"name\":\"2019 53rd Annual Conference on Information Sciences and Systems (CISS)\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 53rd Annual Conference on Information Sciences and Systems (CISS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISS.2019.8693048\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 53rd Annual Conference on Information Sciences and Systems (CISS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISS.2019.8693048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication of IoT Devices for WiFi Connectivity from the Cloud
The deployment of computing devices and machines that constitute the Internet of Things (IoT) had dramatically increased in this decade. To reduce the cost of pre-deployment effort, an already existing Wi-Fi infrastructure (Access Point) can be used to grant these devices access to Internet connectivity. This paper presents the use of standard tunneled based EAP (TEAP) protocol for authenticating IoT devices from the cloud using an EAP-AKA’ inner method EAP. It mainly focuses on the deployment architecture, security against MiTM attack by exploring different RFCs associated with those protocols.