Making Access Control Easy in IoT

被引:2
|
作者
Andalibi, Vafa [1 ]
Dev, Jayati [1 ]
Kim, DongInn [1 ]
Lear, Eliot [2 ]
Camp, L. Jean [1 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Cisco Syst, Zurich, Switzerland
基金
美国国家科学基金会;
关键词
Usable security; Internet of Things; Network security; Usable access control; IoT; MUD; Manufacturer Usage Description;
D O I
10.1007/978-3-030-81111-2_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure installation of Internet of Things (IoT) devices requires configuring access control correctly for each device. In order to enable correct configuration Manufacturer Usage Description (MUD) has been developed by Internet Engineering Task Force (IETF) to automate the protection of IoT devices by micro-segmentation using dynamic access control lists. The protocol defines a conceptually straightforward method to implement access control upon installation by providing a list of every authorized access for each device. This access control list may contain a few rules or hundreds of rules for each device. As a result, validating these rules is a challenge. In order to make the MUD standard more usable for developers, system integrators, and network operators, we report on an interactive system called MUD-Visualizer that visualizes the files containing these access control rules. We show that, unlike manual analysis, the level of the knowledge and experience does not affect the accuracy of the analysis when MUD-Visualizer is used, indicating that the tool is effective for all participants in our study across knowledge and experience levels.
引用
收藏
页码:127 / 137
页数:11
相关论文
共 50 条
  • [1] Making It Look Easy: Maintaining the Magic of Access
    Samples, Jacquie
    Healy, Ciara
    SERIALS REVIEW, 2014, 40 (02) : 105 - 117
  • [2] A Personalized Access Control Based on IoT
    Jang, Jae J.
    Moon, Jaekun
    Jung, Im Y.
    2015 IEEE 21ST PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2015, : 317 - 318
  • [3] A Blockchain based access control for IoT
    Riabi, Imen
    Dhif, Yosr
    Ben Ayed, Hella Kaffel
    Zaatouri, Khaled
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 2086 - 2091
  • [4] SMAC: Scalable Access Control in IoT
    Saxena, Amitabh
    Duraisamy, Pradeepkumar
    Kaulgud, Vikrant
    2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2016, : 169 - 176
  • [5] Framework for authentication and access control in IoT
    Bate, Kossi Owoude
    Kumar, Naresh
    Khatri, Sunil Kumar
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 34 - 39
  • [6] Decentralising Access Control for IoT Environment
    Savvaidis, Charalampos
    Patsonakis, Christos
    Stavropoulos, Georgios
    Blitsi, Anastasia Kassiani
    Papoutsoglou, Iordanis
    Votis, Konstantinos
    Tzovaras, Dimitrios
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,
  • [7] Access Control in Dynamic IoT Scenarios
    Yen, I-Ling
    Tiwari, Ayu
    Bastani, Farokh
    2023 IEEE 15TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEM, ISADS, 2023, : 101 - 108
  • [8] Outsourcing Access Control for a Dynamic Access Configuration of IoT Services
    Montesano, Philipp
    Hueffmeyer, Marc
    Schreier, Ulf
    IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, : 59 - 69
  • [9] Making Tuberculosis Care and Control Easy Again
    Small, Peter M.
    AMERICAN JOURNAL OF RESPIRATORY AND CRITICAL CARE MEDICINE, 2016, 194 (05) : 537 - 538
  • [10] MAKING CONTROL EASY WITH PERSONAL COMPUTERS.
    Oram, Ted
    Control and Instrumentation, 1986, 18 (04): : 43 - 44