Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control

被引:1
|
作者
Janardhanan, Janani [1 ]
Sharbaf, Mehrdad S. [1 ]
机构
[1] Calif State Univ Dominguez Hills, Dept Comp Sci, Los Angeles, CA USA
关键词
Security; Access Control; CoAP; Encryption; IoT; Authentication and Authorization;
D O I
10.1109/CSCI.2017.229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) is basically a system of interrelated computing devices on a network which perform data collection and exchange of real world properties. The major developments witnessed in IoT are mainly within companies, industries, a home environment etc. To increase the scalability of IoT, various security concerns need to be overcome. IoT devices are mostly resource constrained. Complicated network produces potential vulnerabilities referred to heterogeneous devices, sensors and backend systems. So, to realize the dream of internet of things, security is to be ensured for device to device communication. Though IoT has security mechanisms at the network and device level through identification management, it is safer to have a per-service level specific access control based on the "Roles of Things" to attribute for confidentiality and Integrity. This paper presents the current security practices and puts forth the future scope of improvement in fine tuning service level access control.
引用
收藏
页码:1315 / 1319
页数:5
相关论文
共 50 条
  • [31] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [32] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
  • [33] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
  • [34] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [35] Modal logic for role-based access control
    Kosiyatrakul, T
    Older, S
    Chin, SK
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
  • [36] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [37] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [38] Hierarchical role-based access control development
    Kolegov, D. N.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
  • [39] Role-based access control for web services
    College of Information Sciences and Technology, Donghua University, 1882 Yan'an Road , Shanghai 200051, China
    WSEAS Trans. Inf. Sci. Appl., 2006, 8 (1553-1558):
  • [40] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467