Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the loT

被引:25
作者
Drame-Maigne, Sophie [1 ,2 ]
Laurent, Maryline [2 ]
Castillo, Laurent [1 ]
Ganem, Herve
机构
[1] Gemalto SA, 6 Rue Verrerie, F-92190 Meudon, France
[2] SAMOVAR, Telecom SudParis, CNRS, 9 Rue Charles Fourier, F-91011 Evry, France
关键词
Access control; Internet of Things; IoT; security; survey; CONTROL SCHEME; INTERNET; BLOCKCHAIN; SECURITY; THINGS; IOT; PRIVACY; CHALLENGES; MANAGEMENT; TRUST;
D O I
10.1145/3465170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging loT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies loT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.
引用
收藏
页数:34
相关论文
共 96 条
[51]   KERBEROS - AN AUTHENTICATION SERVICE FOR COMPUTER-NETWORKS [J].
NEUMAN, BC ;
TSO, T .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :33-38
[52]   Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things [J].
Ning, Huansheng ;
Liu, Hong ;
Yang, Laurence T. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (03) :657-667
[53]   Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT [J].
Novo, Oscar .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02) :1184-1195
[54]  
Ouaddah A., 2015, 2015 IEEE ACS 12 INT, P1, DOI DOI 10.1109/AICCSA.2015.7507090
[55]   FairAccess: a new Blockchain-based access control framework for the Internet of Things [J].
Ouaddah, Aafaf ;
Abou Elkalam, Anas ;
Ouahman, Abdellah Ait .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5943-5964
[56]   Access control in the Internet of Things: Big challenges and new opportunities [J].
Ouaddah, Aafaf ;
Mousannif, Hajar ;
Abou Elkalam, Anas ;
Ouahman, Abdellah Ait .
COMPUTER NETWORKS, 2017, 112 :237-262
[57]   Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT [J].
Ouaddah, Aafaf ;
Abou Elkalam, Anas ;
Ouahman, Abdellah Ait .
EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 :523-533
[58]   Physical one-way functions [J].
Pappu, R ;
Recht, R ;
Taylor, J ;
Gershenfeld, N .
SCIENCE, 2002, 297 (5589) :2026-2030
[59]  
Park J., 2004, ACM Transactions on Information and Systems Security, V7, P128, DOI 10.1145/984334.984339
[60]  
Patel S, 2016, 2016 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND APPLICATIONS (IOTA), P304, DOI 10.1109/IOTA.2016.7562742