A Context-Aware Break Glass Access Control System for IoT Environments

被引:0
作者
Van Bael, Dries [1 ]
Kalantari, Shirin [1 ]
Put, Andreas [1 ]
De Decker, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Leuven, Belgium
来源
2020 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS) | 2020年
关键词
Access Control; Break Glass; Internet of Things; INTERNET;
D O I
10.1109/IOTSMS52051.2020.9340209
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Internet of Things (IoT) environments, sensors measure and quantify properties of physical locations, objects and even people. Context-aware access control systems include this data in the decision making process to improve their accuracy and precision. However, access control systems can fail when unexpected situations occur for which no access rules have been defined. One solution implemented by access control systems for critical infrastructure (e.g. a hospital, factory production line), is to break the glass in case of emergency to temporarily obtain the necessary privileges. During this process, sufficient non-repudiation evidence must be collected, which is audited at a later stage to verify whether the emergency access was justified. Shortcomings of existing Break Glass models are twofold: firstly, Break Glass is mostly considered as a static process for which the activation requirements and granted privileges are not adapted to the context of the emergency situation; secondly, a closed environment such as a hospital with authenticated caregivers is generally assumed, which is not realistic for open environments. In this paper, we present a context-aware Break Glass system architecture, which uses contextual information to detect ongoing emergencies, and allows the activation requirements and temporary privileges to be be adapted to the current situation or emergency. Furthermore, the system includes a fail-safe operation to disable the Break Glass activation if the emergency was wrongly detected. Our prototype shows the soundness of the design and its practical feasibility to be used in time-critical scenarios.
引用
收藏
页数:8
相关论文
共 24 条
[1]  
Abowd GD, 1999, LECT NOTES COMPUT SC, V1707, P304
[2]  
[Anonymous], 2020, ERICSSON MOBILITY VI
[3]  
[Anonymous], 1996, Health insurance Portability & Accountability Act
[4]   Access control for smarter healthcare using policy spaces [J].
Ardagna, Claudio A. ;
di Vimercati, Sabrina De Capitani ;
Foresti, Sara ;
Grandison, Tyrone W. ;
Jajodia, Sushil ;
Samarati, Pierangela .
COMPUTERS & SECURITY, 2010, 29 (08) :848-858
[5]   How to securely break into RBAC: the BTG-RBAC model [J].
Ferreira, Ana ;
Chadwick, David ;
Farinha, Pedro ;
Correia, Ricardo ;
Zao, Gansen ;
Chilro, Rui ;
Antunes, Luis .
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, :23-+
[6]   Modular Context-Aware Access Control for Medical Sensor Networks [J].
Garcia-Morchon, Oscar ;
Wehrle, Klaus .
SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, :129-138
[7]  
Gupta SKS, 2006, PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, P251
[8]  
He WJ, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P255
[9]   An Autonomic Context Management System for Pervasive Computing [J].
Hu, Peizhao ;
Indulska, Jadwiga ;
Robinson, Ricky .
2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, :213-+
[10]   A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues [J].
Kayes, A. S. M. ;
Kalaria, Rudri ;
Sarker, Iqbal H. ;
Islam, Md. Saiful ;
Watters, Paul A. ;
Ng, Alex ;
Hammoudeh, Mohammad ;
Badsha, Shahriar ;
Kumara, Indika .
SENSORS, 2020, 20 (09)