Abstract

The Internet of Things (IoT) describes a computing paradigm in which heterogeneous and connected devices support data-centric processes. Essential in ensuring secure and trustworthy IoT ecosystems, Identity and Access Management (IAM) refers to the policies and technologies used to grant or revoke access to these systems. Following Concept Synthesis of the relevant literature, the directions in IAM technologies are discussed in the context of a preliminary model that can be used to visualize and order extant directions from the literature. This model will help information security practitioners and researchers to visualize and categorize the state of the art in IAM capabilities, necessary to identify how they integrate over an expansive IoT network. In doing so, this will support discussion among the multi-disciplinary experts who may contribute to the modern IoT ensemble. Therefore, this research a) identifies the state of the art in IAM technologies, and b) categorizes the themes specific to IAM in a preliminary model that can help asset owners to maintain continuous representation of IAM capabilities, among other security controls across their IoT assets.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.