Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2797044.2797052acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
poster

Poster: Activity-Based Access Control for IoT

Published: 07 September 2015 Publication History

Abstract

In traditional access control systems, a process is granted or not the access to a resource following a control on a single action without taking into consideration user and/or system context. In this paper we introduce a novel concept and a generalized version of context-aware access control in the Internet of Things that we name Activity Control. Our approach is aimed to be aware of the user's context and the overall system's one to make decision on granting or denying the requested action. To implement our concept we used a finite-state machine and the asymmetric encryption mechanism called Ciphertext-Policy Attribute-Based Encryption to achieve a real-time access policy adaptation following user's and/or system's context evolution.

References

[1]
J. Liu, Y. Xiao, and C. P. Chen, "Internet of things' authentication and access control," Int. J. Secur. Netw., vol. 7, no. 4, pp. 228--241, 2012.
[2]
P. Mahalle, P. Thakre, N. Prasad, and R. Prasad, "A fuzzy approach to trust based access control in internet of things," in VITAE, 2013, pp. 1--5.
[3]
G. Bianchi, A. T. Capossele, C. Petrioli, and D. Spenza, "Agree: exploiting energy harvesting to support data-centric access control inWSNs," Ad Hoc Networks, vol. 11, no. 8, pp. 2625 -- 2636, 2013.
[4]
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proceedings of the 2007 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007.
[5]
N. R. P. Parikshit N. Mahalle, Bayu Anggorojati and R. Prasad, "Identity authentication and capability based access control (iacac) for the internet of things," Journal of Cyber Security and Mobility, vol. 1, no. 4, pp. 309--348, 2013.
[6]
B. Anggorojati, P. Mahalle, N. Prasad, and R. Prasad, "Capability-based access control delegation model on the federated iot network," in Wireless Personal Multimedia Communications (WPMC), 2012 15th International Symposium on, Sept 2012, pp. 604--608.
[7]
S. Gusmeroli, S. Piccione, and D. Rotondi, "A capability-based security approach to manage access control in the internet of things," Mathematical and Computer Modelling, vol. 58, no. 5--6, 2013.
[8]
S. Jahid and N. Borisov, "Piratte: Proxy-based immediate revocation of attribute-based encryption," arXiv preprint arXiv:1208.4877, 2012.

Cited By

View all
  • (2022)Review Study on Blockchain Frameworks for Security Issues in IoT Devices2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)10.1109/ISMSIT56059.2022.9932744(876-881)Online publication date: 20-Oct-2022
  • (2021)Blockchain-Based Secured Access Control in an IoT SystemApplied Sciences10.3390/app1104177211:4(1772)Online publication date: 17-Feb-2021
  • (2021)Background and Related WorkInternet of Things and Access Control10.1007/978-3-030-64998-2_2(13-58)Online publication date: 28-Jan-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SmartObjects '15: Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects
September 2015
68 pages
ISBN:9781450335355
DOI:10.1145/2797044
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2015

Check for updates

Author Tags

  1. CP-ABE
  2. access control
  3. activity control
  4. finite-state machine
  5. internet of things

Qualifiers

  • Poster

Funding Sources

  • Labex MS2T

Conference

MobiCom'15
Sponsor:

Acceptance Rates

SmartObjects '15 Paper Acceptance Rate 6 of 19 submissions, 32%;
Overall Acceptance Rate 15 of 41 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Review Study on Blockchain Frameworks for Security Issues in IoT Devices2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)10.1109/ISMSIT56059.2022.9932744(876-881)Online publication date: 20-Oct-2022
  • (2021)Blockchain-Based Secured Access Control in an IoT SystemApplied Sciences10.3390/app1104177211:4(1772)Online publication date: 17-Feb-2021
  • (2021)Background and Related WorkInternet of Things and Access Control10.1007/978-3-030-64998-2_2(13-58)Online publication date: 28-Jan-2021
  • (2019)Privacy Enhancing Technologies in the Internet of Things: Perspectives and ChallengesIEEE Internet of Things Journal10.1109/JIOT.2018.28786586:2(2159-2187)Online publication date: Apr-2019
  • (2018)Role-Based Access Control for Vehicular Adhoc Networks2018 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)10.1109/BlackSeaCom.2018.8433628(1-5)Online publication date: Jun-2018
  • (2017)Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications2017 IEEE Trustcom/BigDataSE/ICESS10.1109/Trustcom/BigDataSE/ICESS.2017.251(301-308)Online publication date: Aug-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media