Abstract
In the IoT (Internet of Things), data are exchanged among subjects and objects in devices through manipulating objects. Here, even if subjects manipulate objects according to the CBAC (Capability-Based Access Control) model, the subjects can get data which the subjects are not allowed to get, i.e. illegal information flow and late information flow occur. In order to make the IoT secure, the OI (Operation Interruption) and the TBOI (Time-Based OI) protocols are implemented to interrupt operations occurring illegal and late types of information flows. In addition, two types of capability token selection algorithms are proposed to make the protocols more useful. In our previous studies, an electric energy consumption model of a device supporting the information flow control is proposed. In this paper, electric energy consumption of each protocol is made clear based on the energy consumption model. In the simulation evaluation, it is shown that the total electric energy consumption in the OI and the TBOI protocols with capability token selection algorithms is smaller than the conventional OI and TBOI protocols.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Raspberry pi 3 model b+. https://www.raspberrypi.org/products/raspberry-pi-3-model-b-plus/
Raspbian, version 10.3, 13 February 2020. https://www.raspbian.org/
Uwmeter (2011). http://www.metaprotocol.com/UWmeter/Features.html
Date, C.J.: An Introduction to Database Systems, 8th edn. Addison Wesley, Boston, MA, USA (2003)
Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston, MA, USA (1982)
Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press, Indianapolis, IN, USA (2018)
Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3(3/4), 1–16 (2013)
Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)
Kataoka, H., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: Multi-level power consumption model and energy-aware server selection algorithm. Int. J. Grid Utility Comput. 8(3), 201–210 (2017)
Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Read-write abortion (RWA) based synchronization protocols to prevent illegal information flow. In: Proceeding of the 17th International Conference on Network-Based Information Systems, pp. 120–127 (2014)
Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)
Nakamura, S., Enokido, T., Takizawa, M.: Information flow control in object-based peer-to-peer publish/subscribe systems. Concurr. Comput. Practice Exp. 32(8), e5118 (2020)
Nakamura, S., Enokido, T., Takizawa, M.: A capability token selection algorithm for lightweight information flow control in the IoT. In: Proceeding of the 24th International Conference on Network-Based Information Systems, pp. 23–34 (2021)
Nakamura, S., Enokido, T., Takizawa, M.: Implementation and evaluation of the information flow control for the Internet of Things. Concurr. Comput. Practice Exp. 33(19), e6311 (2021)
Nakamura, S., Enokido, T., Takizawa, M.: Information flow control based on capability token validity for secure IoT: implementation and evaluation. Internet of Things 15, 100423 (2021)
Nakamura, S., Enokido, T., Takizawa, M.: Traffic reduction for information flow control in the IoT. In: Proceeding of the 16th International Conference on Broad-Band Wireless Computing, Communication and Applications, pp. 67–77 (2021)
Nakamura, S., Enokido, T., Takizawa, M.: Energy consumption model of a device supporting information flow control in the IoT. In: Proceeding of the 10th International Conference on Emerging Internet, Data, and Web Technologies, pp. 142–152 (2022)
Oma, R., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: An energy-efficient model for fog computing in the internet of things (IoT). Internet of Things 1–2, 14–26 (2018)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)
Tanganelli, G., Vallati, C., Mingozzi, E.: Coapthon: easy development of coap-based IoT applications with python. In: IEEE 2nd World Forum on Internet of Things (WF-IoT 2015), pp. 63–68 (2015)
Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceeding of the IEEE International Conference on Web Services (ICWS 2005), p. 569 (2005)
Acknowledgement
This work was supported by Japan Society for the Promotion of Science (JSPS) KAKENHI Grant Number JP20K23336.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Nakamura, S., Enokido, T., Takizawa, M. (2022). Energy Consumption of the Information Flow Control in the IoT: Simulation Evaluation. In: Barolli, L., Hussain, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-030-99584-3_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-99584-3_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-99583-6
Online ISBN: 978-3-030-99584-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)