Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control

被引:1
|
作者
Janardhanan, Janani [1 ]
Sharbaf, Mehrdad S. [1 ]
机构
[1] Calif State Univ Dominguez Hills, Dept Comp Sci, Los Angeles, CA USA
关键词
Security; Access Control; CoAP; Encryption; IoT; Authentication and Authorization;
D O I
10.1109/CSCI.2017.229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) is basically a system of interrelated computing devices on a network which perform data collection and exchange of real world properties. The major developments witnessed in IoT are mainly within companies, industries, a home environment etc. To increase the scalability of IoT, various security concerns need to be overcome. IoT devices are mostly resource constrained. Complicated network produces potential vulnerabilities referred to heterogeneous devices, sensors and backend systems. So, to realize the dream of internet of things, security is to be ensured for device to device communication. Though IoT has security mechanisms at the network and device level through identification management, it is safer to have a per-service level specific access control based on the "Roles of Things" to attribute for confidentiality and Integrity. This paper presents the current security practices and puts forth the future scope of improvement in fine tuning service level access control.
引用
收藏
页码:1315 / 1319
页数:5
相关论文
共 50 条
  • [41] Adding Attributes to Role-Based Access Control
    Kuhn, D. Richard
    Coyne, Edward J.
    Weil, Timothy R.
    COMPUTER, 2010, 43 (06) : 79 - 81
  • [42] Cryptographic Role-Based Access Control, Reconsidered
    Liu, Bin
    Michalas, Antonis
    Warinschi, Bogdan
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289
  • [43] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [44] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [45] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [46] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [47] Static Enforcement of Role-Based Access Control
    Ali, Asad
    Fernandez, Maribel
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
  • [48] Spatial context in role-based access control
    Zhang, Hong
    He, Yeping
    Shi, Zhiguo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 166 - 178
  • [49] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [50] Integrating Attributes into Role-Based Access Control
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249