ABSTRACT

The detailed security architecture with possible threats and attacks are presented in this chapter which provides a systematic way of countering possible threats. The future outlook will consider the case in which no prior knowledge of the trust relationship between two network domains in Federated IoT. IoT is a great technological revolution which represents the convergence of Information, communication and technology. Traditional security solutions will almost certainly not suitable due to resource constraints and scale to IoT's amalgam of context and devices. WSN and RFID are identified as the likely candidates for IoT and scalability, resource constraints and distributed nature of IoT as key challenges to address IdM problem. The evolution of computing from centralized to distributed era has considerably increased the complexity of IdM. Varied scope of identity results into different IdM architecture like centralized, distributed and hybrid. In the sequel, there are different IdM approaches like user-centric, device-centric and hybrid.