Abstract
Security and privacy are hot topics when considering the Internet of Things (IoT) application scenarios. By dealing with sensitive and sometimes personal data, IoT application environments need mechanisms to protect against different threats. The traditional security mechanisms are usually static and were not designed considering the dynamism imposed by IoT environments. Those environments could have mobile and dynamic entities that can change their status at deployment time, needing novel security mechanisms to cope with their requirements. Thus, a flexible approach to security provision is imperative. Context-Aware Security (CAS) provides dynamic security for IoT environments by being aware of the context. CAS solutions can adapt the security service (e.g., authentication, authorization, access control, and privacy-preserving) provision based on the context of the environment. This work reviews the concepts around CAS and presents an extensive review of existing solutions employing CAS in their architecture. Moreover, we define a taxonomy for CAS based on the context-awareness area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48157-5_29
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: a context-aware security scheme for smart spaces. In: Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications, pp. 489–496, Machr 2003. https://doi.org/10.1109/PERCOM.2003.1192774
Al-Turjman, F., Alturjman, S.: Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Industr. Inf. 14(6), 2736–2744 (2018). https://doi.org/10.1109/TII.2018.2808190
Alagar, V., Alsaig, A., Ormandjiva, O., Wan, K.: Context-based security and privacy for healthcare IoT. In: Proceedings of the 2nd IEEE International Conference on Smart Internet of Things, pp. 122–128, August 2018. https://doi.org/10.1109/SmartIoT.2018.00-14
Nasir, A.: An ontology based approach for context-aware security in the internet of things (IoT). Int. J. Wirel. Microwave Technol. 11(1), 28–46 (2021). https://doi.org/10.5815/ijwmt.2021.01.04
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010). https://doi.org/10.1016/j.comnet.2010.05.010
Brezillon, P., Mostefaoui, G.K.: Context-based security policies: a new modeling approach. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 154–158, March 2004. https://doi.org/10.1109/PERCOMW.2004.1276923
Future Market Insights: Global Internet of Things (IoT) Security Product Market Overview (2017). https://www.futuremarketinsights.com/reports/internet-of-things-security-products-market
Gansel, S., Schnitzer, S., Gilbeau-Hammoud, A., Friesen, V., Dürr, F., Rothermel, K., Maihöfer, C., Krämer, U.: Context-aware access control in novel automotive HMI systems. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 118–138. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26961-0_8
Gheisari, M., Wang, G., Khan, W.Z., Fernández-Campusano, C.: A context-aware privacy-preserving method for IoT-based smart city using software defined networking. Comput. Secur. 87, 101470 (2019). https://doi.org/10.1016/j.cose.2019.02.006, http://www.sciencedirect.com/science/article/pii/S0167404818313336
Grimm, D., Stang, M., Sax, E.: Context-aware security for vehicles and fleets: a survey. IEEE Access 9, 101809–101846 (2021). https://doi.org/10.1109/ACCESS.2021.3097146
Gupta et al., H.: iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw. Pract. Exp. 47(9), 1275–1296 (2017). https://doi.org/10.1002/spe.2509
Habib, K., Leister, W.: Context-aware authentication for the internet of things. In: Proceedings of the 11th International Conference on Autonomic and Autonomous Systems, p. 6 (2015)
Hosseinzadeh, S., Virtanen, S., Díaz-Rodríguez, N., Lilius, J.: a semantic security framework and context-aware role-based access control ontology for smart spaces. In: Proceedings of the 1st International Workshop on Semantic Big Data, pp. 8:1–8:6. SBD 2016, ACM, New York, NY, USA (2016). https://doi.org/10.1145/2928294.2928300
Hu et al., J.: A dynamic, context-aware security infrastructure for distributed healthcare applications. In: Proceedings of the 1st Workshop on Pervasive Privacy Security, Privacy, and Trust, pp. 1–8. Citeseer (2004)
Jia, Y.J., et al.: ContexIoT: towards providing contextual integrity to appified IoT platforms. In: Proceedings of the 21st Network and Distributed System Security Symposium, pp. 1–15 (2017)
Li, W., Joshi, A., Finin, T.: SVM-CASE: an SVM-based context aware security framework for vehicular Ad-Hoc networks. In: Proceedings of the 82nd IEEE Vehicular Technology Conference, pp. 1–5, September 2015. https://doi.org/10.1109/VTCFall.2015.7391162
de Matos, E., Tiburski, R.T., Amaral, L.A., Hessel, F.: Providing context-aware security for IoT environments through context sharing feature. In: Proceedings of the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, pp. 1711–1715, August 2018. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00257
de Matos, E., et al.: Context information sharing for the Internet of Things: a survey. Comput. Netw. 166, 1–19 (2020). https://doi.org/10.1016/j.comnet.2019.106988, http://www.sciencedirect.com/science/article/pii/S1389128619310400
Mostefaoui, G.K., Brezillon, P.: Modeling context-based security policies with contextual graphs. In: Proceedings of the IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 28–32, March 2004. https://doi.org/10.1109/PERCOMW.2004.1276900
Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. IEEE Commun. Surv. Tutor. 16(1), 414–454 (2014). https://doi.org/10.1109/SURV.2013.042313.00197
Psarra, E., Verginadis, Y., Patiniotakis, I., Apostolou, D., Mentzas, G.: A context-aware security model for a combination of attribute-based access control and attribute-based encryption in the healthcare domain. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds.) Web, Artificial Intelligence and Network Applications, pp. 1133–1142. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-44038-1_104
Rachid, S., Challal, Y., Nadjia, B.: Internet of things context-aware privacy architecture. In: Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, pp. 1–2, November 2015. https://doi.org/10.1109/AICCSA.2015.7507247
Ramos, J.L.H., Bernabe, J.B., Skarmeta, A.F.: Managing context information for adaptive security in IoT environments. In: Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, pp. 676–681, March 2015. https://doi.org/10.1109/WAINA.2015.55
Sikder, A.K., Babun, L., Aksu, H., Uluagac, A.S.: Aegis: a context-aware security framework for smart home systems. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 28–41. ACSAC 2019, Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3359789.3359840
Sylla, T., Chalouf, M.A., Krief, F., Samaké, K.: Context-aware security in the internet of things: a survey. Int. J. Autonom. Adapt. Commun. Syst. 14(3), 231–263 (2021). https://doi.org/10.1504/IJAACS.2021.117808, https://www.inderscienceonline.com/doi/abs/10.1504/IJAACS.2021.117808
Sylla, T., Chalouf, M.A., Krief, F., Samaké, K.: Setucom: secure and trustworthy context management for context-aware security and privacy in the internet of things. Secur. Commun. Netw. 2021, 6632747 (2021). https://doi.org/10.1155/2021/6632747
Tikkinen-Piri, C., Rohunen, A., Markkula, J.: EU general data protection regulation: changes and implications for personal data collecting companies. Comput. Law Secur. Rev. 34(1), 134–153 (2018). https://doi.org/10.1016/j.clsr.2017.05.015, http://www.sciencedirect.com/science/article/pii/S0267364917301966
Trnka, M., Cerny, T.: On security level usage in context-aware role-based access control. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing. pp. 1192–1195. SAC 2016, ACM, New York, NY, USA (2016). https://doi.org/10.1145/2851613.2851664
Zhang, L., Li, Y., Wang, L., Lu, J., Li, P., Wang, X.: An efficient context-aware privacy preserving approach for smartphones. Secur. Commun. Netw. 2017, 1–11 (2017). https://doi.org/10.1155/2017/4842694
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
de Matos, E., Viegas, E., Tiburski, R., Hessel, F. (2023). Context-Aware Security in the Internet of Things: A Review. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 655. Springer, Cham. https://doi.org/10.1007/978-3-031-28694-0_49
Download citation
DOI: https://doi.org/10.1007/978-3-031-28694-0_49
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28693-3
Online ISBN: 978-3-031-28694-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)