TY - JOUR T1 - The Role of Access Control and Device Authentication in the Internet of Things AU - Shawket Thiab, Ali AU - Bin Shibghatullah, Abdul Samad AU - Mohd. Yusoh, Zeratul Izzah JO - Journal of Engineering and Applied Sciences VL - 13 IS - 9 SP - 2680 EP - 2684 PY - 2018 DA - 2001/08/19 SN - 1816-949x DO - jeasci.2018.2680.2684 UR - https://makhillpublications.co/view-article.php?doi=jeasci.2018.2680.2684 KW - Internet of things KW -internet protocol KW -wireless sensor networks KW -transmission control protocol KW -constrained KW -Malaysia AB - The new generation of wireless sensor networks that is known as the internet of things enables the direct connection of physical objects to the internet using microcontrollers. In most cases, these microcontrollers have very limited computational resources. In this study, we investigate the access control solution for the IETF standard draft constrained application protocol using the datagram transport layer security protocol for transport security. We use the centralized approach to save access control information in the framework. Since, the public key cryptography operations might be computationally too expensive for constrained devices we build our solution based on symmetric cryptography. ER -