Evaluation of an IoT Application-Scoped Access Control Model over a Publish/Subscribe Architecture Based on FIWARE

被引:7
|
作者
Pozo, Alejandro [1 ]
Alonso, Alvaro [1 ]
Salvachua, Joaquin [1 ]
机构
[1] Univ Politecn Madrid, Dept Ingn Sistemas Telemat, Escuela Tecn Super Ingn Telecomunicac, Madrid 28040, Spain
关键词
IoT; security; identity management; access control; OAuth; 2; 0; CoAP; publish & subscribe; IAACaaS; INTERNET;
D O I
10.3390/s20154341
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) brings plenty of opportunities to enhance society's activities, from improving a factory's production chain to facilitating people's household tasks. However, it has also brought new security breaches, compromising privacy and authenticity. IoT devices are vulnerable to being accessed from the Internet; they lack sufficient resources to face cyber-attack threats. Keeping a balance between access control and the devices' resource consumption has become one of the highest priorities of IoT research. In this paper, we evaluate an access control architecture based on the IAACaaS (IoT application-Scoped Access Control as a Service) model with the aim of protecting IoT devices that communicate using the Publish/Subscribe pattern. IAACaaS is based on the OAuth 2.0 authorization framework, which externalizes the identity and access control infrastructure of applications. In our evaluation, we implement the model using FIWARE Generic Enablers and deploy them for a smart buildings use case with a wireless communication. Then, we compare the performance of two different approaches in the data-sharing between sensors and the Publish/Subscribe broker, using Constrained Application Protocol (CoAP) and Hypertext Transfer Protocol (HTTP) protocols. We conclude that the integration of Publish/Subscribe IoT deployments with IAACaaS adds an extra layer of security and access control without compromising the system's performance.
引用
收藏
页码:1 / 19
页数:20
相关论文
共 48 条
  • [31] Evaluation of table-based access control in IoT data distribution method using fog computing
    Yoshii, Masaki
    Banno, Ryohei
    Mizuno, Osamu
    IEICE COMMUNICATIONS EXPRESS, 2021, 10 (10): : 822 - 827
  • [32] An Actor-Based, Application-Aware Access Control Evaluation Framework
    Garrison, William C., III
    Lee, Adam J.
    Hinrichs, Timothy L.
    PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 199 - 210
  • [33] Randomized Ensemble SVM based Deep learning with Verifiable dynamic access control using user revocation in IoT architecture
    Kumar, Ravula Arun
    Vinuthna, Kambalapally
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2021, 46 (04):
  • [34] Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure
    Das, Sangjukta
    Namasudra, Suyel
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 821 - 829
  • [35] A Hybrid Access Control Model With Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles
    Aftab, Muhammad Umar
    Munir, Yasir
    Oluwasanmi, Ariyo
    Qin, Zhiguang
    Aziz, Muhammad Haris
    Zakria
    Son, Ngo Tung
    Iran, Van Dinh
    IEEE ACCESS, 2020, 8 : 24196 - 24208
  • [36] A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT
    Awan, Samia Masood
    Azad, Muhammad Ajmal
    Arshad, Junaid
    Waheed, Urooj
    Sharif, Tahir
    INFORMATION, 2023, 14 (02)
  • [37] Research on Risk Analysis-Based Access Control Model of Application System
    Gao, Zhimin
    Wang, Shengyuan
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 750 - +
  • [38] Application of Fuzzy Neural Network in the Trust-Based Access Control Model
    Su, Rina
    Zhang, Yongping
    Fan, Jianbo
    Wang, Yu
    2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1273 - 1276
  • [39] Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program
    Le, Xuan Hung
    Doll, Terry
    Barbosu, Monica
    Luque, Amneris
    Wang, Dongwen
    JOURNAL OF BIOMEDICAL INFORMATICS, 2014, 50 : 184 - 195
  • [40] DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation
    Ren, Jiadong
    Wu, Mingyou
    Zhang, Bing
    Xu, Ke
    Li, Shangyang
    Wang, Qian
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2023, 33 (09) : 1327 - 1354