Evaluation of an IoT Application-Scoped Access Control Model over a Publish/Subscribe Architecture Based on FIWARE

被引:7
|
作者
Pozo, Alejandro [1 ]
Alonso, Alvaro [1 ]
Salvachua, Joaquin [1 ]
机构
[1] Univ Politecn Madrid, Dept Ingn Sistemas Telemat, Escuela Tecn Super Ingn Telecomunicac, Madrid 28040, Spain
关键词
IoT; security; identity management; access control; OAuth; 2; 0; CoAP; publish & subscribe; IAACaaS; INTERNET;
D O I
10.3390/s20154341
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) brings plenty of opportunities to enhance society's activities, from improving a factory's production chain to facilitating people's household tasks. However, it has also brought new security breaches, compromising privacy and authenticity. IoT devices are vulnerable to being accessed from the Internet; they lack sufficient resources to face cyber-attack threats. Keeping a balance between access control and the devices' resource consumption has become one of the highest priorities of IoT research. In this paper, we evaluate an access control architecture based on the IAACaaS (IoT application-Scoped Access Control as a Service) model with the aim of protecting IoT devices that communicate using the Publish/Subscribe pattern. IAACaaS is based on the OAuth 2.0 authorization framework, which externalizes the identity and access control infrastructure of applications. In our evaluation, we implement the model using FIWARE Generic Enablers and deploy them for a smart buildings use case with a wireless communication. Then, we compare the performance of two different approaches in the data-sharing between sensors and the Publish/Subscribe broker, using Constrained Application Protocol (CoAP) and Hypertext Transfer Protocol (HTTP) protocols. We conclude that the integration of Publish/Subscribe IoT deployments with IAACaaS adds an extra layer of security and access control without compromising the system's performance.
引用
收藏
页码:1 / 19
页数:20
相关论文
共 48 条
  • [41] An implementation and evaluation of IoT application development method based on real object-oriented model
    Suzuki, Hiroyuki
    Koyama, Akio
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2018, 8 (03) : 151 - 159
  • [42] Fuzzy based trust model for cloud access control classification mechanism using ghost net architecture
    Kalaiyarasi, D.
    Joy, R. Priscilla
    Jose, M. Victor
    Sridhar, P.
    WIRELESS NETWORKS, 2025, 31 (02) : 1959 - 1973
  • [43] Blockchain-based Bonus-penalty Access Control Strategy for IoT Service in Cloud Radio Over Fiber Network
    Yuan, Jiaqi
    Yang, Hui
    Liang, Yongshen
    Yao, Qiuyan
    Jiao, Libin
    Zhang, Jie
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1603 - 1606
  • [44] Integrating a High-Reliability Multicriteria Trust Evaluation Model with Task Role-Based Access Control for Cloud Services
    Alshammari, Salah T.
    Albeshri, Aiiad
    Alsubhi, Khalid
    SYMMETRY-BASEL, 2021, 13 (03):
  • [45] An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system
    Smari, Waleed W.
    Clemente, Patrice
    Lalande, Jean-Francois
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 31 : 147 - 168
  • [46] Runtime Support for Rule-Based Access-Control Evaluation through Model-Transformation
    Martinez, Salvador
    Garcia, Jokin
    Cabot, Jordi
    PROCEEDINGS OF THE 2016 ACM SIGPLAN INTERNATIONAL CONFERENCE ON SOFTWARE LANGUAGE ENGINEERING (SLE'16), 2016, : 57 - 69
  • [47] A privacy protection model for health care big data based on trust evaluation access control in cloud service environment
    Hu, Xiaohan
    Jiang, Rong
    Shi, Mingyue
    Shang, Jingwei
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (03) : 3167 - 3178
  • [48] Research and application of secure access control method for multi-granularity sensitive resource of industrial loT based on DC-MABAC hybrid model
    Li, Mingshi
    Ma, Yue
    Yin, Zhenyu
    Wang, Chunxiao
    Chai, Anying
    2022 34TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2022, : 4387 - 4393