Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control

被引:1
|
作者
Janardhanan, Janani [1 ]
Sharbaf, Mehrdad S. [1 ]
机构
[1] Calif State Univ Dominguez Hills, Dept Comp Sci, Los Angeles, CA USA
来源
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI) | 2017年
关键词
Security; Access Control; CoAP; Encryption; IoT; Authentication and Authorization;
D O I
10.1109/CSCI.2017.229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) is basically a system of interrelated computing devices on a network which perform data collection and exchange of real world properties. The major developments witnessed in IoT are mainly within companies, industries, a home environment etc. To increase the scalability of IoT, various security concerns need to be overcome. IoT devices are mostly resource constrained. Complicated network produces potential vulnerabilities referred to heterogeneous devices, sensors and backend systems. So, to realize the dream of internet of things, security is to be ensured for device to device communication. Though IoT has security mechanisms at the network and device level through identification management, it is safer to have a per-service level specific access control based on the "Roles of Things" to attribute for confidentiality and Integrity. This paper presents the current security practices and puts forth the future scope of improvement in fine tuning service level access control.
引用
收藏
页码:1315 / 1319
页数:5
相关论文
共 50 条
  • [41] Access Control with RFID in the Internet of Things
    Jensen, Steffen Elmstrom Holst
    Jacobsen, Rune Hylsberg
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 554 - 559
  • [42] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [43] Detecting and Resolving Misconfigurations in Role-Based Access Control
    Mukkamala, Ravi
    Kamisetty, Vishnu
    Yedugani, Pawankumar
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 318 - 325
  • [44] Situational Access Control in the Internet of Things
    Schuster, Roei
    Shmatikov, Vitaly
    Tromer, Eran
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1056 - 1073
  • [45] A survey on Blockchain based access control for Internet of Things
    Riabi, Imen
    Ben Ayed, Hella Kaffel
    Saidane, Leila Azzouz
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 502 - 507
  • [46] A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
    Omran, Esraa
    Grandison, Tyrone
    Nelson, David
    Bokma, Albert
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 36 - 52
  • [47] Access control in the Internet of Things: Big challenges and new opportunities
    Ouaddah, Aafaf
    Mousannif, Hajar
    Abou Elkalam, Anas
    Ouahman, Abdellah Ait
    COMPUTER NETWORKS, 2017, 112 : 237 - 262
  • [48] Distributed Role-based Access Control for Coaliagion Application
    HONG Fan ZHU Xian XING GuanglinHONG Fan
    Geo-Spatial Information Science, 2005, (02) : 138 - 143
  • [49] Enhanced Role-Based Access Control for Cloud Security
    Balamurugan, B.
    Krishna, P. Venkata
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 837 - 852
  • [50] Extending Role-based Access Control for Business Usage
    Klarl, Heiko
    Molitorisz, Korbinian
    Emig, Christian
    Klinger, Karsten
    Abeck, Sebastian
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 136 - +