Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control

被引:1
|
作者
Janardhanan, Janani [1 ]
Sharbaf, Mehrdad S. [1 ]
机构
[1] Calif State Univ Dominguez Hills, Dept Comp Sci, Los Angeles, CA USA
来源
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI) | 2017年
关键词
Security; Access Control; CoAP; Encryption; IoT; Authentication and Authorization;
D O I
10.1109/CSCI.2017.229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) is basically a system of interrelated computing devices on a network which perform data collection and exchange of real world properties. The major developments witnessed in IoT are mainly within companies, industries, a home environment etc. To increase the scalability of IoT, various security concerns need to be overcome. IoT devices are mostly resource constrained. Complicated network produces potential vulnerabilities referred to heterogeneous devices, sensors and backend systems. So, to realize the dream of internet of things, security is to be ensured for device to device communication. Though IoT has security mechanisms at the network and device level through identification management, it is safer to have a per-service level specific access control based on the "Roles of Things" to attribute for confidentiality and Integrity. This paper presents the current security practices and puts forth the future scope of improvement in fine tuning service level access control.
引用
收藏
页码:1315 / 1319
页数:5
相关论文
共 50 条
  • [1] Securing the Web of Things with Role-Based Access Control
    Barka, Ezedine
    Mathew, Sujith Samuel
    Atif, Yacine
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 14 - 26
  • [2] An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things
    Liu, Qiang
    Zhang, Hao
    Wan, Jiafu
    Chen, Xin
    IEEE ACCESS, 2017, 5 : 7001 - 7011
  • [3] Severity Level of Permissions in Role-Based Access Control
    Belim, S. V.
    Bogachenko, N. F.
    Kabanov, A. N.
    2018 12TH INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE ON DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2018,
  • [4] Fabrication of Flexible Role-Based Access Control Based on Blockchain for Internet of Things Use Cases
    Zaidi, Tanzeel
    Usman, Muhammad
    Aftab, Muhammad Umar
    Aljuaid, Hanan
    Ghadi, Yazeed Yasin
    IEEE ACCESS, 2023, 11 (106315-106333) : 106315 - 106333
  • [5] Internet of things' authentication and access control
    Liu, Jing
    Xiao, Yang
    Chen, C.L. Philip
    International Journal of Security and Networks, 2012, 7 (04) : 228 - 241
  • [6] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
    Hingwe, Kamlesh Kumar
    Bhanu, S. Mary Saira
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
  • [7] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [8] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [9] Access control in Internet-of-Things: A survey
    Ravidas, Sowmya
    Lekidis, Alexios
    Paci, Federica
    Zannone, Nicola
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 144 : 79 - 101
  • [10] TARAS: Trust-Aware Role-based Access Control System in Public Internet-of-Things
    Gwak, Bumjin
    Cho, Jin-Hee
    Lee, Dongman
    Son, Heesuk
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 74 - 85