Skip to main content

Trust-ABAC Towards an Access Control System for the Internet of Things

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10232))

Abstract

In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we present the Trust-ABAC, an access control model for the Internet of Things, in which a coupling between the access control based on attributes and the trust concept is done. We evaluated the performance of Trust-ABAC through an experiment based on a simulation. We used the OMNeT++ simulator to show the efficiency of our model in terms of power consumption, response time and the average number of messages generated by an access request. The obtained results of simulation prove the good scalability of our Trust-ABAC model.

This is a preview of subscription content, log in via an institution.

References

  1. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: Proceedings of the 10th International Conference on Frontiers of Information Technology, pp. 257–260 (2012)

    Google Scholar 

  3. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266–2279 (2013)

    Article  Google Scholar 

  4. Yuan, E., Tong, J.: Attribute based access control, a new access control approach for service oriented architectures (SOA). In: 2005 IEEE International Conference on Web Service, pp. 1628–1633 (2005)

    Google Scholar 

  5. Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Sciences and Systems, vol. 8, pp. 18–24 (1974)

    Google Scholar 

  6. Sandhu, R.S.: Lattice-based access control models. IEEE Comput. 26, 9–19 (1993)

    Article  Google Scholar 

  7. Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29, 38–47 (1996)

    Article  Google Scholar 

  8. Feng, F., Lin, C., Peng, D., Li, J.: A trust and context based access control model for distributed systems. In: The 10th IEEE International Conference on High Performance Computing and Communications, pp. 629–634 (2008)

    Google Scholar 

  9. Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: Geo-RBAC: a spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10, 1–34 (2006)

    Article  Google Scholar 

  10. Thomas, M.V., Chandra Sekaran, K.: Agent-based approach for distributed access control in cloud environments. In: International Conference on High Performance Computing and Communications, pp. 1628–1633 (2013)

    Google Scholar 

  11. Smari, W.W., Zhu, J., Clemente, P.: Trust and privacy in attribute based access control for collaboration environments. In: International Conference on Information Integration and Web-based Applications and Services, pp. 49–55 (2009)

    Google Scholar 

  12. Skarmeta, A.F., Hernandez-Ramos, J.L., Victoria Moreno, M.: A decentralized approach for security and privacy challenges in the internet of things. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 67–72 (2014)

    Google Scholar 

  13. Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity authentication and capability based access control (IACAC) for the internet of things. J. Cyber Secur. Mobility 1, 309–348 (2013)

    Google Scholar 

  14. Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Huang, X., Castiglione, A.: Supporting dynamic updates in storage clouds with the Akl-Taylor scheme. Inf. Sci. 387, 56–74 (2017)

    Article  Google Scholar 

  15. Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)

    Article  Google Scholar 

  16. Castiglione, A., De Santis, A., Masucci, B., Palmieri, F., Castiglione, A., Huang, X.: Cryptographic hierarchical access control for dynamic structures. IEEE Trans. Inf. Forensics Secur. 11(10), 2349–2364 (2016)

    Article  MATH  Google Scholar 

  17. Padekar, H., Park, Y., Hu, H., Chang, S.-Y.: Enabling dynamic access control for controller applications in software-defined networks. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, 5–8 June, 2016, pp. 51–61 (2016)

    Google Scholar 

  18. Alam, A., Subbiah, G., Thuraisingam, B., Khan, L.: Reasoning with semantics-aware access control policies for geospatial web services. In: Proceedings of the 3rd ACM Workshop on Secure Web Services, SWS 2006, pp. 69–76. ACM, New York (2006)

    Google Scholar 

  19. Esposito, C., Castiglione, A., Palmieri, F.: Interoperable access control by means of a semantic approach. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 280–285 (2016)

    Google Scholar 

  20. Godik, S., Moses, T.: Extensible access control markup language (xacml) version 1.0. OASIS Standard (2003)

    Google Scholar 

  21. Lin, K.-J., Lu, H., Yu, T., Tai, C.: A reputation and trust management broker framework for web applications. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2005, pp. 262–269 (2005)

    Google Scholar 

  22. Varga, A.: Using the OMNet++ discrete event simulation system in education. IEEE Trans. Educ. 42, 1–11 (1999)

    Article  Google Scholar 

  23. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamdi Ouechtati .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ouechtati, H., Azzouna, N.B. (2017). Trust-ABAC Towards an Access Control System for the Internet of Things. In: Au, M., Castiglione, A., Choo, KK., Palmieri, F., Li, KC. (eds) Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science(), vol 10232. Springer, Cham. https://doi.org/10.1007/978-3-319-57186-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57186-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57185-0

  • Online ISBN: 978-3-319-57186-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics