Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control

被引:1
|
作者
Janardhanan, Janani [1 ]
Sharbaf, Mehrdad S. [1 ]
机构
[1] Calif State Univ Dominguez Hills, Dept Comp Sci, Los Angeles, CA USA
来源
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI) | 2017年
关键词
Security; Access Control; CoAP; Encryption; IoT; Authentication and Authorization;
D O I
10.1109/CSCI.2017.229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) is basically a system of interrelated computing devices on a network which perform data collection and exchange of real world properties. The major developments witnessed in IoT are mainly within companies, industries, a home environment etc. To increase the scalability of IoT, various security concerns need to be overcome. IoT devices are mostly resource constrained. Complicated network produces potential vulnerabilities referred to heterogeneous devices, sensors and backend systems. So, to realize the dream of internet of things, security is to be ensured for device to device communication. Though IoT has security mechanisms at the network and device level through identification management, it is safer to have a per-service level specific access control based on the "Roles of Things" to attribute for confidentiality and Integrity. This paper presents the current security practices and puts forth the future scope of improvement in fine tuning service level access control.
引用
收藏
页码:1315 / 1319
页数:5
相关论文
共 50 条
  • [31] On Automated Role-Based Access Control Assessment in Enterprise Systems
    Walker, Andrew
    Svacina, Jan
    Simmons, Johnathan
    Cerny, Tomas
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 375 - 385
  • [32] Role-based Access Control Model in Home Network Environments
    Kim, Do-Woo
    Kim, Geon Woo
    Lee, Jun-Ho
    Han, Jong-Wook
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 97 - 99
  • [33] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [34] An Overview of Access Control Mechanisms for Internet of Things
    Alramadhan, Mousa
    Sha, Kewei
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [35] Smart Contract-Based Access Control for the Internet of Things
    Zhang, Yuanyu
    Kasahara, Shoji
    Shen, Yulong
    Jiang, Xiaohong
    Wan, Jianxiong
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 1594 - 1605
  • [36] Towards Intelligent Access Control in Internet of Things
    Xu, Lvguan
    Luo, Huan
    Xiao, Zhanhui
    Yu, Ting
    Mu, Tianshi
    Tan, Honghua
    Mi, Qinwen
    2024 5TH INFORMATION COMMUNICATION TECHNOLOGIES CONFERENCE, ICTC 2024, 2024, : 181 - 185
  • [37] Emergence-Based Access Control New Approach to Secure the Internet of Things
    Abou El Kalam, Anas
    Outchakoucht, Aissam
    Es-Samaali, Hamza
    DTUC'18: PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON DIGITAL TOOLS & USES CONGRESS, 2018,
  • [38] TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things
    Liu, Chunchi
    Xu, Minghui
    Guo, Hechuan
    Cheng, Xiuzhen
    Xiao, Yinhao
    Yu, Dongxiao
    Gong, Bei
    Yerukhimovich, Arkady
    Wang, Shengling
    Lyu, Weifeng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 6133 - 6148
  • [39] Role-based access control for CORBA distributed object systems
    Obelheiro, RR
    Fraga, JS
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60
  • [40] Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
    Zhang, Qikun
    Li, Yongjiao
    Li, Zhigang
    Yuan, Junling
    Gan, Yong
    Luo, Xiangyang
    SENSORS, 2019, 19 (23)