{rfName}
Ed

Licencia y uso

Citaciones

Altmetrics

Grant support

This work was supported by AFarCloud project, which has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No. 783221. The JU receives support from the European Union's Horizon 2020 research and innovation programme, and Austria, Belgium, Czech Republic, Finland, Germany, Greece, Italy, Latvia, Norway,Poland, Portugal, Spain, and Sweden. This publication is part of the project PCI2018-092965 funded by MCIN/AEI/10.13039/501100011033 and by the "European Union". This work was supported by the DEMETER project, which has received funding from INDUSTRIAL LEADERSHIP-Leadership in enabling and industrial technologies-Information and Communication Technologies (ICT) under grant agreement No. 857202. ICT receives support from the European Union's Horizon 2020 research and innovation program, and Italy, Luxembourg, Spain, Germany, Greece, United Kingdom, Norway, Czechia, Montenegro, Belgium, Romania, Ireland, Finland, Serbia, Portugal, Poland, Georgia, and Slovenia.

Análisis de autorías institucional

Wang, YitingAutor (correspondencia)De La Parte, Mario San EmeterioAutor o Coautor

Compartir

27 de mayo de 2025
Publicaciones
>
Artículo
No

Edge-enabled IAM for IoTs with edge-based access management and context-driven syncservice

Publicado en:Journal Of Systems Architecture. 165 103430- - 2025-08-01 165(), DOI: 10.1016/j.sysarc.2025.103430

Autores: Wang, Yiting; Martinez-Ortega, Jose-Fernan; Castillejo, Pedro; de la Parte, Mario San Emeterio

Afiliaciones

Univ Politecn Madrid, Escuela Tecn Super Ingn & Sistemas Telecomun, Dept Ingn Telemat Elect, Grp Next Generat Networks & Serv GRyS, Madrid, Spain - Autor o Coautor

Resumen

The number of edge IoT services is experiencing explosive growth. As an entry point for network services, Identity and Access Management (IAM) effectively prevents unauthorized access and blocks most cyber-attacks. However, most edge systems still rely on remote, cloud-based IAM for permission verification. The few edge-enabled IAM solutions that do exist operate on the assumption that attribute values are always up-to-date and provided by a completely trustworthy source, which make access decisions questionable in highly dynamic and distributed IoT environments. To address these challenges, this work proposes EIAM-IoT, an edge-enabled IAM architecture, and an improved Local Authentication and Authorization (LAA) method. The LAA evaluates multi-factor attributes, incorporating the freshness of attribute values and the trustworthiness of attribute providers, to achieve reliable access control. Additionally, the identity information required for LAA is synchronized and stored in the edge database by a context-aware synchronization strategy, which selectively and timely extends relevant identity data based on edge context, optimizing the trade-off between local data management costs and LAA performance. The performance and security analyses show that the LAA does not introduce significant overhead to traditional attribute-based solutions while enabling more fine-grained access control, increasing decision reliability, and offering additional features, such as local verification and federated identity management. While the LAA relies on cloud-extended local data, the system ensures greater availability and resilience to connectivity issues in edge-to-cloud setups. EIAM-IoT is particularly more suitable for dynamic, multi-authority, and edge-native IoT applications to achieve secure, low-latency, offline access to edge IoT services.

Palabras clave

Attribute-based local authentication andAuthenticationAuthorizationAuthorization (laa)Edge computing (ecEdge internet of things (iots) servicesIdentity and access management (iam)InternetPrivacyThing

Indicios de calidad

Impacto bibliométrico. Análisis de la aportación y canal de difusión

El trabajo ha sido publicado en la revista Journal Of Systems Architecture debido a la progresión y el buen impacto que ha alcanzado en los últimos años, según la agencia WoS (JCR), se ha convertido en una referencia en su campo. En el año de publicación del trabajo, 2025, se encontraba en la posición 13/59, consiguiendo con ello situarse como revista Q1 (Primer Cuartil), en la categoría Computer Science, Hardware & Architecture.

Impacto y visibilidad social

Desde la dimensión de Influencia o adopción social, y tomando como base las métricas asociadas a las menciones e interacciones proporcionadas por agencias especializadas en el cálculo de las denominadas “Métricas Alternativas o Sociales”, podemos destacar a fecha 2025-07-15:

  • La utilización de esta aportación en marcadores, bifurcaciones de código, añadidos a listas de favoritos para una lectura recurrente, así como visualizaciones generales, indica que alguien está usando la publicación como base de su trabajo actual. Esto puede ser un indicador destacado de futuras citas más formales y académicas. Tal afirmación es avalada por el resultado del indicador “Capture” que arroja un total de: 7 (PlumX).

Análisis de liderazgo de los autores institucionales

Existe un liderazgo significativo ya que algunos de los autores pertenecientes a la institución aparecen como primer o último firmante, se puede apreciar en el detalle: Primer Autor (WANG, YITING) y Último Autor (SAN EMETERIO DE LA PARTE, MARIO).

el autor responsable de establecer las labores de correspondencia ha sido WANG, YITING.