Abstract
Controller management platforms are part of the rapidly growing IoT infrastructure. Platforms manage physical devices and collect, process and integrate data, making them an attractive target for cybercriminals. Weak access control is one of the key cybersecurity threats in this area. This paper aims to provide a secure platform for remote control of controllers using a tailored access control approach. It also aims to evaluate the effectiveness of the proposed access control method. The implemented platform is configured for smart home solutions. Experiments on the administrative cost, speed and security of the method are carried out in scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Marton, A.: Latest IoT threat statistics. https://iotac.eu/latest-iot-threat-statistics/. Accessed 24 Dec 2021
Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483–2495 (2017)
OWASP top 10 (2021). https://owasp.org/Top10/. Accessed 25 Dec 2021
Gupta, M., Bhatt, S., Alshehri, A.H., Sandhu, R.: Access Control Models and Architectures for IoT and Cyber Physical Systems [interaktyvus]. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-81089-4
Krishna, R.R., et al.: State-of-the-art review on IoT threats and attacks: taxonomy, challenges and solutions. Sustainability 13(16), 9463 (2021)
Babun, L., Kyle, D., Celik, Z.B., Mcdaniel, P., Uluagac, A.S.: A survey on IoT platforms: communication, security, and privacy perspectives. Comput. Netw. 192, 108040 (2021)
Nebbione, G., Calzarossa, M.C.: Security of IoT Application Layer Protocols: Challenges and Findings. Future Internet 12(3), 55 (2020)
Aljeraisy, A., Barati, M., Rana, O., Perera, C.: Privacy laws and privacy by design schemes for the Internet of Things: a developer’s perspective. ACM Comput. Surv. (CSUR) 54(5), 1–38 (2020)
Azam, F., Munir, R., Ahmed, M., Ayub, M., Sajid, A., Abbasi, Z., et al.: Internet of Things (IoT), security issues and its solutions. Sci. Heritage J. 3(2), 18–21 (2019)
Atlam, H.F., Wills, G.B.: An efficient security risk estimation technique for Risk- based access control model for IoT. Internet Things 6, 100052 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Adomkus, T., Klimakas, K., Brūzgienė, R., Narbutaitė, L. (2024). Access Control Approach for Controller Management Platforms. In: Lopata, A., Gudonienė, D., Butkienė, R. (eds) Information and Software Technologies. ICIST 2023. Communications in Computer and Information Science, vol 1979. Springer, Cham. https://doi.org/10.1007/978-3-031-48981-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-48981-5_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-48980-8
Online ISBN: 978-3-031-48981-5
eBook Packages: Computer ScienceComputer Science (R0)