Skip to main content

The Need for New Authentication Methods for Internet of Things
draft-hsothers-iotsens-ps-03

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Dirk Von Hugo , Behcet Sarikaya
Last updated 2023-05-10 (Latest revision 2022-11-06)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

In framework of future 6G the need for easy and secure connectivity between a great amount of small devices as sensors and household appliances will be essential. Such massive Internet of Things (mIoT) requires authentication methods which are reliable also in case of vulnerable wireless links and work for simple cheap (dumb) devices. Aim of this document is to lay ground for the need for new authentication models and admission methods in the framework of devices (e.g., machines in IoT communication) within a (wireless or wireline-based) network. Simple devices may only have a minimum amount of physical interfaces available. As an example for establishing an out-of-band channel for exchange of authentication material radio sensing technology may serve. This is currently under investigation for Wireless LAN and upcoming cellular radio at both IEEE and 3GPP.

Authors

Dirk Von Hugo
Behcet Sarikaya

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)