Authentication-enabled attribute-based access control for smart homes

被引:1
|
作者
Burakgazi Bilgen, Melike [1 ]
Abul, Osman [1 ]
Bicakci, Kemal [2 ]
机构
[1] TOBB Univ Econ & Technol, Dept Comp Engn, Ankara, Turkey
[2] Istanbul Tech Univ, Informat Inst, Istanbul, Turkey
基金
欧盟地平线“2020”;
关键词
Access control; Attribute-based access control; Internet of Things; False matching rate; Smart home security; INTERNET; THINGS;
D O I
10.1007/s10207-022-00639-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart home technologies constantly bring significant convenience to our daily lives. Unfortunately, increased security risks accompany this convenience. There can be severe consequences when unauthorized or malicious users gain access to smart home devices. Therefore, dependable and comprehensive access control models are needed to address the security concerns. To this end, the attribute-based access control (ABAC) model is usually considered the most satisfactory access control model for running IoT applications. However, the uncertainty left with the authentication stage should be carried to the authorization policy specification. In this work, we extend the ABAC model by carrying the assurance level of user authentication obtained from biometric authentication systems for authorization. The extended ABAC model quantifies how far the authentication matching score is from the predefined threshold. This quantification serves as a regular attribute like others to define authorization policies. The novelty in this quantification is that it consults false matching rate and hence can easily normalize across wide range of biometric authentication devices and algorithms. As a result, the resulting access control policies are concise and easy to comprehend. Moreover, our model is fine-grained in that different access policies can be specified for each smart device functionality. This work also shows, through case studies, that the extended ABAC model is feasible and implementable in XACML language.
引用
收藏
页码:479 / 495
页数:17
相关论文
共 50 条
  • [31] Combining Mandatory and Attribute-based Access Control
    Kerr, Lawrence
    Alves-Foss, Jim
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623
  • [32] A contextual attribute-based access control model
    Covington, Michael J.
    Sastry, Manoj R.
    On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006
  • [33] Soft Smart Biopatch for Continuous Authentication-Enabled Cardiac Biometric Systems
    Lee, Sung Hoon
    Lee, Yoon Jae
    Kwon, Kangkyu
    Lewis, Daniel
    Romero, Lissette
    Lee, Jimin
    Zavanelli, Nathan
    Yan, Emily
    Yu, Ki Jun
    Yeo, Woon-Hong
    ADVANCED SENSOR RESEARCH, 2023, 2 (12):
  • [34] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [35] Attribute-Based Messaging: Access Control and Confidentiality
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Khan, Arindam
    Gunter, Carl A.
    Khurana, Himanshu
    Prabhakaran, Manoj
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (04)
  • [36] Attribute-Based Access Control in Service Mesh
    Ponomarev, Kirill Yu.
    2019 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2019,
  • [37] Authorization Recycling in Attribute-Based Access Control
    An Y.
    Helil N.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [38] Monotonicity and completeness in attribute-based access control
    Crampton, Jason
    Morisset, Charles
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 33 - 48
  • [39] Supporting attribute-based access control with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Kamprath, Nora
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 465 - +
  • [40] Attribute-Based Access Control in Web Applications
    Kauser, Sadia
    Rahman, Ayesha
    Khan, Asad Mohammed
    Ahmad, Tameem
    APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN ENGINEERING, SIGMA 2018, VOL 1, 2019, 698 : 385 - 393