A novel zero-trust network access control scheme based on the security profile of devices and users

被引:13
|
作者
Garcia-Teodoro, P. [1 ]
Camacho, J. [1 ]
Macia-Fernandez, G. [1 ]
Gomez-Hernandez, J. A. [1 ]
Lopez-Marin, V. J. [1 ]
机构
[1] Univ Granada, Network Engn & Secur Grp, CITIC, Granada, Spain
关键词
Access control; Anomaly detection; Security profile; Zero trust access; THINGS APPLICATIONS; INTERNET; CHALLENGES;
D O I
10.1016/j.comnet.2022.109068
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security constitutes a principal concern for communication networks and services at present. This way, threats should be under control to minimize risks over time in real environments. With this aim, we introduce here a new approach for access control aimed to strengthen security in corporate networks and service providers related environments. Our proposal, named SADAC (Security Attribute-based Dynamic Access Control) presents three main novel features: (i) security related attributes regarding both configuration and operation are considered for network access control of final devices/users; (ii) a dynamic supervision procedure is implemented to evaluate the security profile associated to devices/users over time and, if so, to apply corresponding access restrictions; and (iii) a supervision procedure that also permits to diagnose the causes of inadequate security behaviours, so that the final devices/users can adapt their configuration and/or operation. We describe the overall access control methodology as well as the aspects for its implementation. In particular, we present and evaluate the specific deployment of SADAC for a corporate WiFi environment supported on a Raspberry Pi-based AP to provide Internet access to mobile devices. Through this experimentation we can conclude the convenience of adopting the approach for improving security by minimizing risks in network and communication environments.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0
    Abuhasel, Khaled Ali
    IEEE ACCESS, 2023, 11 : 116398 - 116409
  • [2] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [3] A Blockchain Empowered Smart Home Access Scheme Based on Zero-trust Architecture
    Liu, Peng
    Xu, Yinghui
    Wang, Yanqing
    Fan, Ping
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 43 - 49
  • [4] A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
    Son, Seunghwan
    Kwon, Deokkyu
    Lee, Sangwoo
    Kwon, Hyeokchan
    Park, Youngho
    IEEE ACCESS, 2024, 12 : 154066 - 154079
  • [5] Toward Secure and Resilient Networks: A Zero-Trust Security Framework with Quantum Fingerprinting for Devices Accessing Network
    Zaid, Bassfar
    Sayeed, Ashar
    Bala, Priti
    Alshehri, Ali
    Alanazi, Abdulaziz Mohammed
    Zubair, Swaleha
    MATHEMATICS, 2023, 11 (12)
  • [6] Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture
    Xu, Mingyang
    Guo, Junli
    Yuan, Haoyu
    Yang, Xinyu
    ELECTRONICS, 2023, 12 (04)
  • [7] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [8] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    Concurrency and Computation: Practice and Experience, 2022, 34 (23)
  • [9] Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams
    Sasada, Taisho
    Masuda, Yuto
    Taenaka, Yuzo
    Kadobayashi, Youki
    Fall, Doudou
    2021 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2021, : 24 - 31
  • [10] Poster: Toward Zero-Trust Path-Aware Access Control
    Seaton, Joshua H.
    Hounsinou, Sena
    Wood, Timothy
    Xu, Shouhuai
    Brown, Philip N.
    Bloom, Gedare
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 267 - 269