Skip to main content

Context-Aware Security in the Internet of Things: A Review

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 655))

Abstract

Security and privacy are hot topics when considering the Internet of Things (IoT) application scenarios. By dealing with sensitive and sometimes personal data, IoT application environments need mechanisms to protect against different threats. The traditional security mechanisms are usually static and were not designed considering the dynamism imposed by IoT environments. Those environments could have mobile and dynamic entities that can change their status at deployment time, needing novel security mechanisms to cope with their requirements. Thus, a flexible approach to security provision is imperative. Context-Aware Security (CAS) provides dynamic security for IoT environments by being aware of the context. CAS solutions can adapt the security service (e.g., authentication, authorization, access control, and privacy-preserving) provision based on the context of the environment. This work reviews the concepts around CAS and presents an extensive review of existing solutions employing CAS in their architecture. Moreover, we define a taxonomy for CAS based on the context-awareness area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48157-5_29

    Chapter  Google Scholar 

  2. Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: a context-aware security scheme for smart spaces. In: Proceedings of the 1st IEEE International Conference on Pervasive Computing and Communications, pp. 489–496, Machr 2003. https://doi.org/10.1109/PERCOM.2003.1192774

  3. Al-Turjman, F., Alturjman, S.: Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Industr. Inf. 14(6), 2736–2744 (2018). https://doi.org/10.1109/TII.2018.2808190

    Article  Google Scholar 

  4. Alagar, V., Alsaig, A., Ormandjiva, O., Wan, K.: Context-based security and privacy for healthcare IoT. In: Proceedings of the 2nd IEEE International Conference on Smart Internet of Things, pp. 122–128, August 2018. https://doi.org/10.1109/SmartIoT.2018.00-14

  5. Nasir, A.: An ontology based approach for context-aware security in the internet of things (IoT). Int. J. Wirel. Microwave Technol. 11(1), 28–46 (2021). https://doi.org/10.5815/ijwmt.2021.01.04

  6. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010). https://doi.org/10.1016/j.comnet.2010.05.010

    Article  MATH  Google Scholar 

  7. Brezillon, P., Mostefaoui, G.K.: Context-based security policies: a new modeling approach. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 154–158, March 2004. https://doi.org/10.1109/PERCOMW.2004.1276923

  8. Future Market Insights: Global Internet of Things (IoT) Security Product Market Overview (2017). https://www.futuremarketinsights.com/reports/internet-of-things-security-products-market

  9. Gansel, S., Schnitzer, S., Gilbeau-Hammoud, A., Friesen, V., Dürr, F., Rothermel, K., Maihöfer, C., Krämer, U.: Context-aware access control in novel automotive HMI systems. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 118–138. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26961-0_8

    Chapter  Google Scholar 

  10. Gheisari, M., Wang, G., Khan, W.Z., Fernández-Campusano, C.: A context-aware privacy-preserving method for IoT-based smart city using software defined networking. Comput. Secur. 87, 101470 (2019). https://doi.org/10.1016/j.cose.2019.02.006, http://www.sciencedirect.com/science/article/pii/S0167404818313336

  11. Grimm, D., Stang, M., Sax, E.: Context-aware security for vehicles and fleets: a survey. IEEE Access 9, 101809–101846 (2021). https://doi.org/10.1109/ACCESS.2021.3097146

    Article  Google Scholar 

  12. Gupta et al., H.: iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw. Pract. Exp. 47(9), 1275–1296 (2017). https://doi.org/10.1002/spe.2509

  13. Habib, K., Leister, W.: Context-aware authentication for the internet of things. In: Proceedings of the 11th International Conference on Autonomic and Autonomous Systems, p. 6 (2015)

    Google Scholar 

  14. Hosseinzadeh, S., Virtanen, S., Díaz-Rodríguez, N., Lilius, J.: a semantic security framework and context-aware role-based access control ontology for smart spaces. In: Proceedings of the 1st International Workshop on Semantic Big Data, pp. 8:1–8:6. SBD 2016, ACM, New York, NY, USA (2016). https://doi.org/10.1145/2928294.2928300

  15. Hu et al., J.: A dynamic, context-aware security infrastructure for distributed healthcare applications. In: Proceedings of the 1st Workshop on Pervasive Privacy Security, Privacy, and Trust, pp. 1–8. Citeseer (2004)

    Google Scholar 

  16. Jia, Y.J., et al.: ContexIoT: towards providing contextual integrity to appified IoT platforms. In: Proceedings of the 21st Network and Distributed System Security Symposium, pp. 1–15 (2017)

    Google Scholar 

  17. Li, W., Joshi, A., Finin, T.: SVM-CASE: an SVM-based context aware security framework for vehicular Ad-Hoc networks. In: Proceedings of the 82nd IEEE Vehicular Technology Conference, pp. 1–5, September 2015. https://doi.org/10.1109/VTCFall.2015.7391162

  18. de Matos, E., Tiburski, R.T., Amaral, L.A., Hessel, F.: Providing context-aware security for IoT environments through context sharing feature. In: Proceedings of the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, pp. 1711–1715, August 2018. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00257

  19. de Matos, E., et al.: Context information sharing for the Internet of Things: a survey. Comput. Netw. 166, 1–19 (2020). https://doi.org/10.1016/j.comnet.2019.106988, http://www.sciencedirect.com/science/article/pii/S1389128619310400

  20. Mostefaoui, G.K., Brezillon, P.: Modeling context-based security policies with contextual graphs. In: Proceedings of the IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 28–32, March 2004. https://doi.org/10.1109/PERCOMW.2004.1276900

  21. Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. IEEE Commun. Surv. Tutor. 16(1), 414–454 (2014). https://doi.org/10.1109/SURV.2013.042313.00197

  22. Psarra, E., Verginadis, Y., Patiniotakis, I., Apostolou, D., Mentzas, G.: A context-aware security model for a combination of attribute-based access control and attribute-based encryption in the healthcare domain. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds.) Web, Artificial Intelligence and Network Applications, pp. 1133–1142. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-44038-1_104

    Chapter  Google Scholar 

  23. Rachid, S., Challal, Y., Nadjia, B.: Internet of things context-aware privacy architecture. In: Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, pp. 1–2, November 2015. https://doi.org/10.1109/AICCSA.2015.7507247

  24. Ramos, J.L.H., Bernabe, J.B., Skarmeta, A.F.: Managing context information for adaptive security in IoT environments. In: Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, pp. 676–681, March 2015. https://doi.org/10.1109/WAINA.2015.55

  25. Sikder, A.K., Babun, L., Aksu, H., Uluagac, A.S.: Aegis: a context-aware security framework for smart home systems. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 28–41. ACSAC 2019, Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3359789.3359840

  26. Sylla, T., Chalouf, M.A., Krief, F., Samaké, K.: Context-aware security in the internet of things: a survey. Int. J. Autonom. Adapt. Commun. Syst. 14(3), 231–263 (2021). https://doi.org/10.1504/IJAACS.2021.117808, https://www.inderscienceonline.com/doi/abs/10.1504/IJAACS.2021.117808

  27. Sylla, T., Chalouf, M.A., Krief, F., Samaké, K.: Setucom: secure and trustworthy context management for context-aware security and privacy in the internet of things. Secur. Commun. Netw. 2021, 6632747 (2021). https://doi.org/10.1155/2021/6632747

  28. Tikkinen-Piri, C., Rohunen, A., Markkula, J.: EU general data protection regulation: changes and implications for personal data collecting companies. Comput. Law Secur. Rev. 34(1), 134–153 (2018). https://doi.org/10.1016/j.clsr.2017.05.015, http://www.sciencedirect.com/science/article/pii/S0267364917301966

  29. Trnka, M., Cerny, T.: On security level usage in context-aware role-based access control. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing. pp. 1192–1195. SAC 2016, ACM, New York, NY, USA (2016). https://doi.org/10.1145/2851613.2851664

  30. Zhang, L., Li, Y., Wang, L., Lu, J., Li, P., Wang, X.: An efficient context-aware privacy preserving approach for smartphones. Secur. Commun. Netw. 2017, 1–11 (2017). https://doi.org/10.1155/2017/4842694

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Everton de Matos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

de Matos, E., Viegas, E., Tiburski, R., Hessel, F. (2023). Context-Aware Security in the Internet of Things: A Review. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 655. Springer, Cham. https://doi.org/10.1007/978-3-031-28694-0_49

Download citation

Publish with us

Policies and ethics