Survey on Internet of Things Access Control Security

被引:0
|
作者
Liu Q. [1 ,2 ]
Jin Z. [1 ,2 ]
Chen C. [1 ,2 ]
Gao X. [1 ,2 ]
Zheng N. [1 ,2 ]
Fang Y. [1 ,2 ]
Feng Y. [1 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
关键词
Access control; Attack surface; Internet of things (IoT); Security; Trust chain;
D O I
10.7544/issn1000-1239.20220510
中图分类号
学科分类号
摘要
In recent years, Internet of things (IoT) security incidents have occurred frequently. As an important security mechanism, IoT access control plays an important role. However, the existing Internet access control policies cannot be directly applied to the IoT scenarios because of the differences between IoT and Internet. At present, the IoT access control schemes have not paid attention to the security issues. Once the IoT access control is broken, it will cause serious consequences such as privacy data leakage and authority abuse. Thus, it is urgent to comprehensively study the security issues and solutions for access control of IoT. According to the complex architecture, the variety of devices, low storage and computing performance of IoT, the protection surface and trust relationship in IoT access control is combed, the trust chain is built and the risk transmission law in the trust chain is discussed. Around the protection surface and trust chain, we summarize the existing access control attack surface from the perception layer, network layer, and application layer, and analyze the existing security risks. In view of these security risks, we present the necessary access control security demand, including mechanism improvement, attack surface answer, multilevel authentication and authorization, and the combination with specific scenarios. Based on the requirements, the existing security solutions and targeted access control framework are summarized. Finally, we discuss the challenges faced in IoT access control and point out the future research direction that consists of an in-depth study on access control of the cloud platform of IoT, IoT cloud docking standardization, and the introduction of zero trust concept. © 2022, Science Press. All right reserved.
引用
收藏
页码:2190 / 2211
页数:21
相关论文
共 99 条
  • [1] Sun Qibo, Liu Jie, Li Shan, Et al., Internet of things: Summarize on concepts, architecture and key technology problem, Journal of Beijing University of Posts and Telecommunications, 33, 3, pp. 1-9, (2010)
  • [2] Wegner P., Global IoT market size grew 22% in 2021-these 16 factors affect the growth trajectory to 2027
  • [3] IoT Security primer: Challenges and emerging practices
  • [4] Popular connected cars from Ford and Volkswagen could put your security, privacy and safety at risk, Which? finds
  • [5] Larson S., FDA confirms that St. Jude's cardiac devices can behacked
  • [6] Antonakakis M, April T, Bailey M, Et al., Understanding the Mirai botnet, Proc of the 26th USENIX Conf on Security Symp, pp. 1093-1110, (2017)
  • [7] Yaqoob I, Ahmed E, Hashem I A T, Et al., Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges, IEEE Wireless Communications, 24, 3, pp. 10-16, (2017)
  • [8] Ravidas S, Lekidis A, Paci F, Et al., Access control in Internet-of-things: A survey, Journal of Network and Computer Applications, 144, pp. 79-101, (2019)
  • [9] Zhang Yuqing, Zhou Wei, Peng Anni, Survey of Internet of things security, Journal of Computer Research and Development, 54, 10, pp. 2130-2143, (2017)
  • [10] Yang YiYu, Zhou Wei, Zhao Shangru, Et al., Survey of IoT security research: Threats, detection and defense, Journal on Communications, 42, 8, pp. 188-205, (2021)