Evaluation of an IoT Application-Scoped Access Control Model over a Publish/Subscribe Architecture Based on FIWARE

被引:7
|
作者
Pozo, Alejandro [1 ]
Alonso, Alvaro [1 ]
Salvachua, Joaquin [1 ]
机构
[1] Univ Politecn Madrid, Dept Ingn Sistemas Telemat, Escuela Tecn Super Ingn Telecomunicac, Madrid 28040, Spain
关键词
IoT; security; identity management; access control; OAuth; 2; 0; CoAP; publish & subscribe; IAACaaS; INTERNET;
D O I
10.3390/s20154341
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) brings plenty of opportunities to enhance society's activities, from improving a factory's production chain to facilitating people's household tasks. However, it has also brought new security breaches, compromising privacy and authenticity. IoT devices are vulnerable to being accessed from the Internet; they lack sufficient resources to face cyber-attack threats. Keeping a balance between access control and the devices' resource consumption has become one of the highest priorities of IoT research. In this paper, we evaluate an access control architecture based on the IAACaaS (IoT application-Scoped Access Control as a Service) model with the aim of protecting IoT devices that communicate using the Publish/Subscribe pattern. IAACaaS is based on the OAuth 2.0 authorization framework, which externalizes the identity and access control infrastructure of applications. In our evaluation, we implement the model using FIWARE Generic Enablers and deploy them for a smart buildings use case with a wireless communication. Then, we compare the performance of two different approaches in the data-sharing between sensors and the Publish/Subscribe broker, using Constrained Application Protocol (CoAP) and Hypertext Transfer Protocol (HTTP) protocols. We conclude that the integration of Publish/Subscribe IoT deployments with IAACaaS adds an extra layer of security and access control without compromising the system's performance.
引用
收藏
页码:1 / 19
页数:20
相关论文
共 48 条
  • [21] Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT
    Ouaddah, Aafaf
    Abou Elkalam, Anas
    Ouahman, Abdellah Ait
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 523 - 533
  • [22] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52
  • [23] IoT Based Architecture for Model Predictive Control of HVAC Systems in Smart Buildings
    Carli, Raffaele
    Cavone, Graziana
    Ben Othman, Sarah
    Dotoli, Mariagrazia
    SENSORS, 2020, 20 (03)
  • [24] Evaluation of ticket-based access control method applied to IoT data distribution
    Yoshii, Masaki
    Banno, Ryohei
    Mizuno, Osamu
    IEICE COMMUNICATIONS EXPRESS, 2022, 11 (03): : 148 - 153
  • [25] Access Control Model Based on Trust and Risk Evaluation in IDMaaS
    Liu, Fei
    Wang, Jing
    Bai, Hongtao
    Sun, Huiping
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 179 - 184
  • [26] Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application
    Chen, Hsing-Chung
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 839 - 852
  • [27] Application Level Network Access Control System Based on TNC Architecture for Enterprise Network
    Chen, Zhen
    Deng, Fa-Chao
    Luo, An-An
    Jiang, Xin
    Li, Guo-Dong
    Zhang, Run-hua
    Lin, Chuang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 667 - 671
  • [28] Improved Access Control Strategy Based on RBAC Model and Its Application
    Cheng, Yin-lei
    Wang, Fang
    Shang, Lei-ming
    Wang, Biao-ren
    Xu, Juan
    PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 808 - 813
  • [29] Military Information System Access Control Architecture Based on SDO-ARBAC Model
    Sun, Lin
    Jin, Yan
    Liu, Hao
    Li, Fangsheng
    PRACTICAL APPLICATIONS OF INTELLIGENT SYSTEMS, ISKE 2013, 2014, 279 : 637 - +
  • [30] Performance and Security Evaluation of Table-Based Access Control Applied to IoT Data Distribution Method
    Yoshii, Masaki
    Banno, Ryohei
    Mizuno, Osamu
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2022, E105B (11) : 1390 - 1399