A proposal of a distributed access control over Fog computing: the ITS use case

被引:0
|
作者
Riabi, Imen [1 ]
Kaffel-Ben Ayed, Hella [1 ]
Saidane, Leila Azzouz [1 ]
机构
[1] Univ Manouba, ENSI, Natl Sch Comp Sci, CRISTAL LAB, Manouba, Tunisia
来源
2017 INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS (PEMWN) | 2017年
关键词
Internet of Things; Access control; Fog computing; Intelligent Transport System; DHT; INTERNET; THINGS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) raises many security challenges in relation with the different applications that can be deployed over these environments. IoT access control systems must respond to the new IoT requirements such as scalability, dynamicity, real-time interaction and resources constraint. The goal of this paper is to propose an approach based on Fog and Distributed Hash Table (DHT) toward access control for the Internet of Things. To evaluate the performances of our access solution, we used NS-3 and SUMO. The preliminary obtained results show acceptable overhead for the considered Intelligent Transport System (ITS) scenario.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Distributed Access Control with Outsourced Computation in Fog Computing
    Wang, Qihua
    Lv, Gaoyan
    Sun, Xiuling
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 2446 - 2450
  • [2] An adaptive distributed access control model for IoT and fog computing environments
    Charaf, Lalla Amina
    Alihamidi, Imam
    Deroussi, Anass
    Madi, Abdessalam Ait
    Addaim, Adnane
    Charaf, Moulay El Hassan
    INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL, 2024, 44 (03) : 230 - 245
  • [3] A Distributed Fog-based Access Control Architecture for IoT
    Alnefaie, Seham
    Cherif, Asma
    Alshehri, Suhair
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (12): : 4545 - 4566
  • [4] A Survey on Access Control in Fog Computing
    Zhang, Peng
    Liu, Joseph K.
    Yu, F. Richard
    Sookhak, Mehdi
    Au, Man Ho
    Luo, Xiapu
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) : 144 - 149
  • [5] Access Control in Fog Computing: Challenges and Research Agenda
    Aleisa, Mohammed A.
    Abuhussein, Abdullah
    Sheldon, Frederick T.
    IEEE ACCESS, 2020, 8 : 83986 - 83999
  • [6] A survey on privacy and access control schemes in fog computing
    Khalid, Tauqeer
    Abbasi, Muhammad Abbas Khan
    Zuraiz, Maria
    Khan, Abdul Nasir
    Ali, Mazhar
    Ahmad, Raja Wasim
    Rodrigues, Joel J. P. C.
    Aslam, Mudassar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (02)
  • [7] PROPOSED ACCESS CONTROL AND SECURITY ARCHITECTURE BASED ON FOG COMPUTING FOR IOT ENVIRONMENTS
    Bharathi, C. R.
    Ramesh, L. V.
    Priya, L. Vamsi
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 1398 - 1404
  • [8] Access Control Issues in Utilizing Fog Computing for Transport Infrastructure
    Salonikias, Stavros
    Mavridis, Ioannis
    Gritzalis, Dimitris
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 15 - 26
  • [9] TACRM: trust access control and resource management mechanism in fog computing
    Ben Daoud, Wided
    Obaidat, Mohammad S.
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    Hsiao, Kuei-Fang
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01):
  • [10] Generic Access Control System for Ad Hoc MCC and Fog Computing
    Zaghdoudi, Bilel
    Kaffel-Ben Ayed, Hella
    Harizi, Wafa
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 400 - 415