Security Analysis and proposal of new Access Control model in the Internet of Thing

被引:0
作者
Ouaddah, Aafaf [1 ]
Bouij-Pasquier, Imane [1 ]
Abou Elkalam, Anas [1 ]
Ait Ouahman, Abdellah [1 ]
机构
[1] Cadi Ayyad Univ, OSCARS Lab, ENSA Marrakesh, Marrakech, Morocco
来源
PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2015) | 2015年
关键词
access control model; security policy; privacy; internet of things; web of things; OrBAC;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
the Internet of Things (loT) represents a concept where the barriers between the real world and the cyber-world are progressively annihilated through the inclusion of everyday physical objects combined with an ability to provide smart services. These services are creating more opportunities but at the same time bringing new challenges in particular security and privacy concerns. To address this issue, an access control management system must be implemented. This work introduces a new access control framework for loT environment, precisely the Web of Things (WoT) approach, called "SmartOrBAC" Based on the OrBAC model. SmartOrBAC puts the context aware concern in a first position and deals with the constrained resources environment complexity. To achieve these goals, a list of detailed loT security requirements and needs is drawn up in order to establish the guidelines of the "SmartOrBAC". Then, The OrBAC model is analyzed and extended, regarding these requirements, to specify local asT well as collaboration access control rules; on the other hand, these security policies are enforced by applying web services mechanisms mainly the RESTFUL approach. Finaly the most important works that emphasize access control in loT environment are discussed.
引用
收藏
页码:30 / 35
页数:6
相关论文
共 14 条
  • [1] Abowd G. D., 2000, ACM Transactions on Computer-Human Interaction, V7, P29, DOI 10.1145/344949.344988
  • [2] Engineering Web technologies for embedded applications
    Agranat, ID
    [J]. IEEE INTERNET COMPUTING, 1998, 2 (03) : 40 - 45
  • [3] [Anonymous], 2013, J INTERNET SERVICES
  • [4] [Anonymous], 2006, CCMB200609002
  • [5] [Anonymous], 1996, P 6 INT C EL DOC DOC
  • [6] *CCMB, 2006, CCMB200609001
  • [7] Deze Zeng S. G., WEB THINGS SURVEY
  • [8] Smews: Smart and Mobile Embedded Web Server
    Duquennoy, Simon
    Grimaud, Gilles
    Vandewalle, Jean-Jacques
    [J]. CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 571 - +
  • [9] A capability-based security approach to manage access control in the Internet of Things
    Gusmeroli, Sergio
    Piccione, Salvatore
    Rotondi, Domenico
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1189 - 1205
  • [10] Holler Jan, MACHINE TO MACHINE I, P307