Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control

被引:1
|
作者
Janardhanan, Janani [1 ]
Sharbaf, Mehrdad S. [1 ]
机构
[1] Calif State Univ Dominguez Hills, Dept Comp Sci, Los Angeles, CA USA
关键词
Security; Access Control; CoAP; Encryption; IoT; Authentication and Authorization;
D O I
10.1109/CSCI.2017.229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) is basically a system of interrelated computing devices on a network which perform data collection and exchange of real world properties. The major developments witnessed in IoT are mainly within companies, industries, a home environment etc. To increase the scalability of IoT, various security concerns need to be overcome. IoT devices are mostly resource constrained. Complicated network produces potential vulnerabilities referred to heterogeneous devices, sensors and backend systems. So, to realize the dream of internet of things, security is to be ensured for device to device communication. Though IoT has security mechanisms at the network and device level through identification management, it is safer to have a per-service level specific access control based on the "Roles of Things" to attribute for confidentiality and Integrity. This paper presents the current security practices and puts forth the future scope of improvement in fine tuning service level access control.
引用
收藏
页码:1315 / 1319
页数:5
相关论文
共 50 条
  • [1] Securing the Web of Things with Role-Based Access Control
    Barka, Ezedine
    Mathew, Sujith Samuel
    Atif, Yacine
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 14 - 26
  • [2] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [3] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [4] An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things
    Liu, Qiang
    Zhang, Hao
    Wan, Jiafu
    Chen, Xin
    IEEE ACCESS, 2017, 5 : 7001 - 7011
  • [5] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [6] Service-oriented role-based access control
    Xu, Feng
    Lai, Hai-Guang
    Huang, Hao
    Xie, Li
    Jisuanji Xuebao/Chinese Journal of Computers, 2005, 28 (04): : 686 - 693
  • [7] Fabrication of Flexible Role-Based Access Control Based on Blockchain for Internet of Things Use Cases
    Zaidi, Tanzeel
    Usman, Muhammad
    Aftab, Muhammad Umar
    Aljuaid, Hanan
    Ghadi, Yazeed Yasin
    IEEE ACCESS, 2023, 11 (106315-106333) : 106315 - 106333
  • [8] Severity Level of Permissions in Role-Based Access Control
    Belim, S. V.
    Bogachenko, N. F.
    Kabanov, A. N.
    2018 12TH INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE ON DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2018,
  • [9] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [10] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184